logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • ASEC Weekly Malware Statistics (January 30th, 2023 – February 5th, 2023)
  • Major CrackDown – Police Hacked Exclu ‘secure’ Cybercriminal Message Platform
  • Vulnerability Provided Access to Toyota Supplier Management Network
  • OpenSSL fixes High Severity data-stealing bug – patch now!
  • PixPirate – Advanced Android Threat Targets Brazilian Financial Organizations

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2022-46842 (js_help_desk) 2 February 2023
  • CVE-2022-46815 (conditional_shipping_for_woocommerce) 2 February 2023
  • CVE-2022-45807 (wp_mail_log) 2 February 2023
  • CVE-2022-45067 (exclusive_addons_for_elementor) 2 February 2023
  • CVE-2022-40692 (sunshine_photo_cart) 2 February 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Ransomware operators lurk on your network after their attack

Posted on 22 June 2020

From bleepingcomputer.com

Eye

When a company suffers a ransomware attack, many victims feel that the attackers quickly deploy the ransomware and leave so they won’t get caught. Unfortunately, the reality is much different as threat actors are not so quick to give up a resource that they worked so hard to control.

Read more…

Posted in News

Post navigation

Previous post: Malwarebytes causing performance issues in Windows 10 2004
Next post: A new variant of the IcedID banking Trojan spreads using COVID-19 lures
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.