Cerber Ransomware Now Hunts for Databases
Cerber is one of the most famous ransomware packages. It has advanced itself to also target databases. It is available for buy as a service (ransomware as a service) on the “darknet” as part of an affiliate program. Cerber is part of a turnkey service in which clients share 40% of their profits with the developers. In turn, the Cerber team does all the work on the back end to make it simple for their affiliates to distribute the malware and receive payments from victims, minus the overhead costs. Get support for McAfee by mcafee.com/activate expert.
This update is significant. It expands the capabilities to not only targeted consumers but now to businesses as well. This shift is the latest trend with the top ransomware families. Attackers have realized that though consumers may pay $300–$500 for their files, businesses will may much more. As most criminals do, they pursue the money.
The latest version of Cerber has made three important changes. The malware now alters the extensions of encrypted files to a random four characters. Previously it changed the extension of altered files to .cerber3. This adaptation makes it more difficult to scan for affected files.
Second, a new HTML executable file displays the ransom note and instructions in a window. It is cleaner, provides links, and is more professional-looking. This may give victims more confidence that they are dealing with professionals and should expect to receive a key to unlock their files if they pay.
Finally, and most importantly, the malware now attempts to stop database processes running on the target system so it can encrypt the data. This is a significant shift in focus from consumers to businesses, which typically run databases containing important operational data. When database files are open and in use by software, they cannot easily be encrypted. Cerber attempts to close the database software so the files can be encrypted.
Big business (Cerber Ransomware Now Hunts for Databases)
Security experts believe Cerber is based in Russia because it avoids systems configured in the Russian language. But it has the rest of the world to target, and it does well. Estimates vary, but profits appear to range from $1 million to $2.5 million per year. In August, Check Point Software and IntSights tracked 161 campaigns active with eight new ones launched every day. In July, they tracked 150,000 new system infections, with an average extortion demand of one Bitcoin. Get support for McAfee by www.mcafee.com/activate expert.
Cerber in action (Cerber Ransomware Now Hunts for Databases)
Cerber developers are pushing the next evolution of ransomware by going after database files. Admins, watch your database processes for unexpected stops. It might be an indication of Cerber ransomware trying to undermine file integrity. But that would be the wrong time to consider instituting good backups and applying good security practices.
The best strategic cybersecurity capability process includes elements to Predict, Prevent, Detect, and Respond to risks. This holds true for protection against ransomware. A solid data backup/restoration capability is important, as is quality antimalware to block attacks. Behavioral controls to educate users will reduce the biggest infection vector: people opening infected phishing emails and malware. Rapid detection and sensors must be present to quickly raise the alarm for variants that cannot be stopped. Recovery teams with clear processes, tools, and backups must then get things back to normal. Ransomware is not easy to defeat, but the first step it to have a comprehensive plan and resources. Cerber and others will continue to evolve. Therefore, your security must be just as agile.
Read Also (How to install McAfee LiveSafe)
- Even Cybercriminals Get Spammed
- Samsung and McAfee team up to fight against Bloatware issues
- McAfee Displacement Products Create a Trip of a Lifetime
- Intel McAfee dispute heads for settlement talks
Last Updated on February 1, 2022