Ransomware

CCleaner Malware

Users of CCleaner for Windows, a maintenance and file clean-up tool developed by Avast Piriform, are being told to update their software immediately, since it’s been discovered that hackers had installed a backdoor in the official application that would allow additional malware to be added to the infected system.

The ability of cybercriminals to access user systems by adding malware into official software builds of trusted vendors is a major red flag. Protecting your data just got even more critical, so here’s what you need to know.

How to avoid ransomware attack

Given the volume of record-breaking and prominently reported breaches, it’s not surprising that 2016 was dubbed the year of the hack. Whether it was news of Yahoo’s two record-breaking hacks, state-sponsored hacking, or Dropbox and social networks being breached, hardly a week went by without news of a major security breach.

Ransomware is clearly a profitable line of work. Not surprisingly, its reach is growing, and 2017 is now being coined the year of the hacker.

Acronis True Image 2018 for Mac

Data protection is important regardless of your preferred platform. So while the launch of Acronis True Image 2018 is naturally going to attract attention from the PC crowd, we think it’s important to give a little love to Mac users.

After all, we have included a lot of new features specifically for Macs. The result? You can generate even more reliable backups, enjoy easier control, and secure your data against a brutal digital threat that’s increasingly targeting Macs.

Acronis True Image 2018

Today is a big day at Acronis, as we launch Acronis True Image 2018, which offers a host of new backup and recovery capabilities. It also marks the first time a personal backup product will include artificial intelligence-based technology to actively protect data against ransomware.

This combination of features makes Acronis True Image 2018 the most reliable, easiest to use and most secure personal backup and recovery software available – and we’re stoked to set a new standard in data protection for individuals, families and home office users.

Serpent ransomware

Serpent is the 4th generation of the malware originally known as Zyklon. First, it became WildFire, then Hades Locker, and now, Serpent. This type of ransomware typically spreads through spear phishing emails containing a link to download the cryptolocker.

Spora ransomware

Spora ransomware has been active since the beginning of this year. Typically, it is distributed through spear phishing and watering hole attacks, but the recently discovered variant spreads through the HoeflerText pop-ups on infected websites in EITest campaigns.

Even though Spora ransomware is not new, the latest modification, when it was first discovered, was only blocked by a limited number of anti-malware programs. This could be due to the fact that the new build is using the polymorphic encryptor to create new copies of itself for further spreading and extra code obfuscation. It also has a slightly changed payload.

Fight Ransomware

Whenever there’s a large-scale ransomware attack like WannaCry and EternalPetya, the number of infected computers reported by the media can be overwhelming.  It’s easy to forget there are thousands of individuals who need to rebuild their digital lives in the aftermath.  

But hearing customers talk about how Acronis saved their data is a great reminder that our solutions help real people every day. Take yesterday’s email titled “How Acronis True Image 2017 NG proved to be a lifeguard.

Cerber Ransomware

The well known Cerber ransomware continues to be active this summer. The size of the cryptolocker varies between 244 to 292 Kbytes, with the new builds spreading via spear phishing email campaigns, targeting enterprises. The latest Cerber ransomware easily bypasses traditional defenses. The analyzed Cerber sample (MD5: cfd2d6f189b04d42618007fc9c540352) was only detected as a suspicious malicious object by nine out of 64 antiviruses on the first submission to Virustotal. The low detection rate can be explained by the fact that the cryptolocker is using a polymorphic encryptor and API call obfuscation to protect its copies from being detected by antiviruses.

 

Patya Wiper

Remember that fast-moving cyberattack that slashed its way across the globe in late June? Turns out it wasn’t really ransomware but an even more malicious piece of malware called a “wiper” that left victims with no hope of getting back their data.  

A new ransomware variant avoided detection by being spread through a spear phishing email campaign as an obfuscated PowerShell script. Many traditional anti-malware solutions are not ready for the next generation of ransomware attacks. Acronis, however, has been very successful.