close
close

FBI warns prospects, Gmail users and VPN about possible cyberattacks

FBI warns prospects, Gmail users and VPN about possible cyberattacks

The FBI and the security and infrastructure security agency warn Gmail, Outlook and other E -mail platforms about a new Cyberattack that they could target.

Hacks are related to a group that targeted victims in medical, education, legal, insurance, technology and production, according to a press release.

In February, hackers hit about 300 people, according to federal authorities.

UTEP warns of phishing attack after student financial aid repayments have hit

Breaking news

Get the latest news from North Texas and not only.

Cyberattacks is part of Medusa, a ransomware variant identified in June 2021, FBI announced last week.

“This common cyber security notice is part of a running #Stopransomware effort to publish counseling for network defenders detailing various ransomware variants and ransomware threatening actors,” the authorities said in a press release.

Creators Medusa recruit other hackers and pay them between 100 and $ 1 million to work for them, using techniques like Phishing to target victims, FBI said.

Jim Rossman: A reader warning on cleaning the ink jet printer

Here’s what you know about ransomware and how people can protect their information.

Ransomware attackers proliferate

The Medusa variant has been used for ransomware attacks – a type of malware attack that encrypts the victim’s personal data – from 2021 to the present, according to the authorities.

Medusa initially started as a closed group, with a team that deals with everything, said the statement. Now, he hires other hackers outside the initial group to commit attacks, but still controls key tasks such as scam discussions.

Jim Rossman: What happens to your Instagram after you die?

They operate with a double extortion tactic: they block the data and threaten to drain them if they are not paid, according to the authorities.

How to protect myself?

FBI and CISA recommend organizations to implement mitigation to improve cyber security post -based on threatening actors.

  • Securely store several children of sensitive data and servers in separate locations, using options such as hard drives and cloud services.
  • Use long passwords and change it frequently.
  • Set the IP authentication with two factors, which require users to offer two or more verification factors to access their accounts, especially accounts that access critical systems.
  • Identify, detect and investigate the odd activity with a network monitoring tool.
  • Ensure that all operating systems, software and firmware are updated.
  • Request VPNs or hosts for distance access.
  • Filters network traffic by stopping unknown or trusted origins from accessing distance services on internal systems.
  • Disable unused ports
  • Ensure that all reserve data is encrypted and inflexible.