More ransomware news. Education and Health Care sectors seem to be popular targets lately. https://www.scmagazine.com/brief/alabama-education-department-still-impacted-by-thwarted-ransomware-intrusion
Category: Cyber Crime
This new ransomware scam will hassle you with phone calls until you pay up | TechRadar

TRENDING
Expert Insights
Best web hosting
Best website builder
Best standing desks
When you purchase through links on our site, we may earn an affiliate commission. Here’s how it works.
Pro
Security
This new ransomware scam will hassle you with phone calls until you pay up
News
By Sead Fadilpašić
published yesterday
Victims threatened with repeated phone calls

Image credit: Pixabay (Image credit: Pixabay)
A new ransomware group has been discovered harassing its victims on the phone until they pay up.
Advertisement
A report from anti-ransomware company, Halycon said that Volcano Demon was seen going after “several” targets in the last couple of weeks, deploying a new encryptor called LukaLocker.
Its methodis relatively simple – the threat actor will first find a way into the target network, map it out, and then exfiltrate as many sensitive files as they can. Then, they will deploy the encryptor, lock down the files and entire systems, and then demand payment in cryptocurrency in exchange for the decryption key, and for keeping the files for themselves.
7 Accounts You Must Always Protect With Two-Factor Authentication
Two-factor authentication adds an extra layer of security and keeps your account protected even if your password is compromised. While it’s advisable to enable two-factor authentication on all accounts that support it, here are some accounts that should always have this extra layer of protection.
The US Wants to Integrate the Commercial Space Industry With Its Military to Prevent Cyber Attacks | WIRED
As space becomes more important to the world’s critical infrastructure, the risk increases that hostile nation-states will deploy cyberattacks on important satellites and other space infrastructure. Targets would include not just spy satellites or military communications satellites, but commercial spacecraft too.
Don’t overlook the security risk posed by QR codes | TechRadar
But the more mainstream the technology has become, the more attractive it has become for threat actors. The same accessibility that makes the QR code a useful tool also makes it an effective vector for phishing and malware delivery.
What Is Bitcoin Mining? How to Prevent Bitcoin Scams? | Fortinet
Some companies pretend to provide mining services using a bitcoin mining cloud. They take your money but never mine any bitcoin for you. People often fall for the scam because they want to get their hands on the bitcoin cryptocurrency, and while there are legitimate services out there, some are fraudulent.
Beware Of Malicious PDF Files That Mimic As Microsoft 2FA Security Update
Phishing attacks are evolving to use QR codes to trick users into entering their credentials on malicious websites, which can be designed to look like legitimate login pages and may even prefill the username field to increase believability.
Crypto Ponzi Scheme Busted: US Court Orders Hedge Fund Owner To Pay $84 Million
The court order details how, instead of generating returns through investments, Ikkurty used funds from new investors to pay out promised returns to earlier participants. This practice, known as a Ponzi scheme, is inherently unsustainable and ultimately leads to the collapse of the scheme when new investors dry up.
Cryptocurrency Scams: How to Spot, Report, and Avoid Them
Platforms market to retail buyers and investors to get them to contribute upfront capital to secure an ongoing stream of mining power and rewards. These platforms don’t own the hash rate they claim to and don’t deliver the rewards after receiving your down payment. While cloud mining isn’t always a scam, to keep your money, you must conduct rigorous due diligence on the platform before investing.
Crypto scammers stole nearly $60m from 20 victims in H1 2024, data shows
Victims are often lured through phishing comments from impersonated accounts on X. Once on the phishing site, they are tricked into making seemingly legitimate transactions from their non-custodial wallets, resulting in unauthorized fund access.