Acronis Active Protection

Ransomware attacks target medical facilities

Ransomware is constantly targeting medical companies across the United States. Within the past year, these attacks have led to downtime, lost productivity, and - in some cases - needing to close their doors for good. Learn how Acronis Cyber Protection solutions and the innovative AI-based Acronis Active Protection defense can help to ensure that these same consequences don't hit your organization.

HILDACRYPT ransom note

A new ransomware family was discovered in August 2019. Called HILDACRYPT, it is named after the Netflix cartoon “Hilda” because the TV show’s YouTube trailer was included in the ransom note of the original version of the malware.

HILDACRYPT camouflages itself as a legitimate XAMPP installer, which is an easy to install Apache distribution containing MariaDB, PHP, and Perl. However, the cryptolocker’s file name ‘xamp’ differs from the legitimate version. Moreover, the ransomware file does not have a digital signature.

We took a deep dive into this new cyberthreat to show how it works and how you can help overcome its attack with Acronis Cyber Backup.

Nemty ransomware analysis

We took a deep dive into the Nemty ransomware strain, a sophisticated new form of malware that's spreading via a fake PayPal website. Similar in some aspects to Buran and GandCrab ransomware strains, Nemty incorporates three distinct layers of encryption to lock down victim data. Learn how this threat to your system works and how Acronis can help you evade and overcome it.

Syrk ransomware ID screen

We took a deep dive into the insidious Syrk ransomware strain that targets young Fortnite players to deliver a debilitating encryption payload complete with Cryptolocker anti-monitoring and self-defense capabilities. Learn how this threat to your system works and how Acronis can help you overcome it to keep your files safe.

Hurricane Dorian shows why cyber protection is vital to disaster preparedness

Faced with cyberthreats like ransomware and cryptojacking, it’s no surprise modern organizations have focused on their cybersecurity posture. Yet Hurricane Dorian shows that storms, floods, and fires still threaten a company’s digital assets just as seriously as hackers do.

Backup without cybersecurity is no longer enough. But cybersecurity without data protection isn’t enough either.

A recent IDC whitepaper revealed that cyber protection – which combines proven data protection and cutting-edge cybersecurity – provides an effective strategy against both digital and physical threats.

NioGuard Triple-A Rating Cover

Cryptojacking – or illicit cryptomining – continues to be a major headache for companies and home users, with research showing that cybercriminals made an impressive $52.7 million by mining digital coins on victims’ machines during the first half of 2019.

NioGuard Security Lab, a member of Anti-Malware Testing Standard Organization (AMTSO), researched the matter and just posted a report that examines the level of protection against cryptojacking offered by leading endpoint security providers.

The results might shock some observers because Acronis, which now defends against illicit mining in its data protection solutions, outperformed the vast majority of leading endpoint security providers.

Just released - Acronis True Image 2020

They say that the only constant in life is change. That’s never been more apparent than in today’s digital world, where the amount of data we generate grows exponentially, hackers use cutting-edge technology to make their attacks more effective, and individuals spend more on multiple services and solutions to protect and defend our personal data.

In our ongoing mission to protect all data, applications, and systems – wherever they are found – today we’ve released Acronis True Image 2020, the new version of our award-winning personal cyber protection solution. With more than 100 enhancements designed to improve its performance and multiple new features that provide greater protection and control, this new release delivers everything an individual needs to ensure they never lose another file.

Buran Ransomware uses RIG Exploit Kit

Buran is a new version of the Vega ransomware strain (a.k.a. Jamper, Ghost, Buhtrap) that attacked accountants from February through April 2019. The new Buran ransomware first was discovered in June 2019.

What’s interesting is that this cryptolockers’ code was written in Object Pascal in Delphi IDE – a programming language that was popular in Latin American and former Soviet Union countries around two decades ago when it was being taught in colleges and technical universities.

Let’s take a close look at this ransomware to find out the installation process, communication details, and encryption model.

Louisiana Ransomware Attack Prompts A Statewide Emergency

A wave of ransomware attacks on public schools in the southern US state of Louisiana has prompted an unusual response, as the governor declared an official emergency to kick-start a coordinated response by several state-level law-enforcement and technology agencies.

This latest ransomware attack, which locks up the data on computer systems and only provides the key to free up the data if the victim pays an online ransom, continues a global wave of similar attacks that lately has targeted municipal governments as well as the healthcare and manufacturing industries.

Ransomware takes down airplane parts manufacturer ASCO

Another of the world’s major manufacturers was laid low recently by a ransomware attack. Production at ASCO, the giant Belgian airplane parts maker, has been halted for over a week with no end in sight. Nearly 1,000 employees have been sent home on paid leave while the company struggles to restore critical systems frozen by the malware assault.

Unfortunately, the fate of ASCO has been shared by many organizations that are ill-prepared to combat the world’s deadliest malware threat. The incident reflects a number of major trends in the ongoing struggle between cybercriminals and their targets in the public and private sector.