Malware that has been around for years, adds ransomware to increase their payouts…
It’s no secret, ransomware is quick and easy money for cyber criminals. It really isn’t too surprising that this new tag-team approach is taking place. We saw something similar when Peta ransomware added the Mischa component to ensure file encryption.
Betabot, a form of malware that has been around since 2013, has added Cerber ransomware to their plan of attack. Betabot will still steal your banking information and passwords, but after doing so it will encrypt you data and hold it for ransom. So, to be clear, not only are they getting paid from selling your data on the dark web but also when if you pay them the ransom demand.
According to ZDNet, Betabot is installed using the Neutrino exploit kit, which uses infected documents to ask potential victims to “Enable Macros”. If and when they do, the malware is able to steal login data and passwords from web browsers. From here, the Betabot has obtained all of the information it needs from your PC, so why not render it utterly useless to the user?! That exactly what they do, by installing Cerber ransomware. Your files are encrypted, until you pay up. Or, if you’re smart, you’ve backed up your data and you don’t need to pay a dime.
What can you do to stay protected?
First and foremost, and this cannot be stressed enough, think before you click. Too many times our curiosity gets the best of us and we are click on something we shouldn’t. Please be aware of what sites you’re visiting, what files you’re downloading, and what links you’re clicking on.
Second, find a security software that implements application whitelisting technology. This form of protection safeguards against today’s cyber security threats, as it only allows for secure programs to run. Everything else is going to be blocked. Now, please note – these security software programs cannot entirely account for human error. If you choose to whitelist a program that hasn’t been tested, you could still become infected. So again, be aware of what you’re downloading!