Lodi, California confirmed that the phone line and data systems disruptions it suffered months back was caused by a ransomware. The ransomware entered the city’s system disguised as an invoice attachment in an email to city staff.
Three ransomware attacks from last week caused notable disruptions on institutions from different public sectors, namely on an energy company, a law enforcement agency, and several public schools.
The GandCrab gang might be back to their old tricks. Various security researchers reported that the group might be responsible for releasing a more advanced ransomware variant called Sodinokibi.
A newly uncovered ransomware family was found targeting QNAP network-attached storage (NAS) devices. Named eCh0raix, the malware was reportedly designed for targeted ransomware attacks.
The relatively new ransomware Sodinokibi is already using an array of vectors to infect victims. Aside from using spam and phishing emails, the group behind this malware continues to add more delivery methods to their arsenal.
Baltimore City and County governments, Ohio-based NEO Urology, and Talley Medical Surgical Eyecare in Indiana are still in recovery efforts after ransomware incidents caused daily operations to be temporarily suspended.
The ransomware evolution continues: 2019 data shows changes in volume of threats and a shift in targets. New evasion techniques and distribution methods are also being deployed by malware creators.
Security researchers saw a spate of attacks targeting Windows servers running unsecure or misconfigured MySQL databases to infect them with the GandCrab ransomware.