Ransom Campaign Exploiting Open-Source Tool
A new campaign has been observed using the open-source DiskCryptor encryption tool to perform ransom attacks on targeted devices.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
A new campaign has been observed using the open-source DiskCryptor encryption tool to perform ransom attacks on targeted devices.
Affected platforms
The following platforms are known to be affected:
Threat details
The threat actor operating the campaign appears to be exploiting insecure Mamba ransomware.
Remediation steps
| Type | Step |
|---|---|
|
If Remote Desktop Protocol (RDP) is not used, then ensure port 3389 (TCP/UDP) is blocked at your internet firewall. If RDP is used, then:
If a device on your network becomes infected with ransomware it will begin encrypting local machine files and files on any network the logged-in user has permission to access. For system administration accounts this may include backup storage locations. To avoid becoming infected with ransomware, ensure that:
Identifying the source of infection:
To limit the damage of ransomware and enable recovery:
|
Last edited: 11 January 2022 9:35 am