cuteRansomware Uses Cloud Based Services

The new ransomware, cuteRansomware, is using cloud based services for distribution…

cuteRansomare is the latest ransomware strain that is starting to use a popular cloud based service for distribution.  The ransomware is functioning off of Google Docs.  They’re using this platform as their command and control center.  It is also being used to avoid detection.

According to SC Magazine UK, the latest ransomware is a variant of the Chinese ransomware, my-Little-Ransomware.

To properly protect against ransomware, the US-CERT recommends implementing an application whitelist approach to avoid unwanted programs from running on your PC.

If you find yourself a victim of ransomware, we encourage you follow these five steps:

  1. Do not pay the ransom – If you do, you’re just giving the hackers a reason to keep hacking.  Use your back up files to restore your systems.  Again, don’t pay!!
  2. Inform the FBI – By informing the FBI they can investigate to potentially bring legal action against the hacker.  All cyber criminal activity should be reported to the federal IC3 agency.  You can file a complaint with them here.
  3. Notify your current security software company – You also MUST inform your security software company.  If they didn’t know they missed a malicious attack, they cannot stop it in the future.  Also, many anti-virus software companies share their blacklist, or the list of known bad files.  So by sharing it with your software company, they then share it with others; saving thousands of people from falling victim to the same attack that just got you.
  4. Educate yourselves and your employees – Many times we attend one training, or listen to one webinar and consider ourselves educated on the matter.  This cannot be further from the truth.  Continued education on current cyber security threats is imperative.  We recommend our friends at KnowBe4 for both personal and enterprise training on cyber security.  As always, all PC Matic home security subscribers are offered a free cyber security training through KnowBe4 as well.
  5. Reevaluate your security software protection – If your security software failed you, perhaps you should look for an alternative security option.  The United States Computer Emergency Readiness Team (US-CERT) strongly advises using a whitelist security technology.  For personal uses, PC Matic home protection offers superior protection with advanced whitelisting technology.  For enterprise use, there is PC Matic Pro, which offers advanced security protection with proprietary whitelisting technology.

(Visited 12 times, 1 visits today)

Leave a Reply

Your email address will not be published. Required fields are marked *