Avast_Blog_Security_News: German ransomware victim hacks back
#1
Information 
Quote:
[Image: TVDumYE.png]

Plus, the FBI cautions some cyberattacks can bypass MFA; 37,000 Canadian TransUnion customers may be compromised; and French experts warn of multiple cyber-espionage incidents

After paying his attacker €670, ransomware victim Tobias Frömel sought revenge by hacking into the attacker’s command and control center and generating decryption keys for all the other victims who suffered the same attack. Frömel explained to Bleeping Computer that he was able to pull from the attacker’s server the Hardware IDs for each of the 2,858 victims stored in the server’s database, along with each victim’s unique decrypter key. Called “Muhstik” Ransomware because the encrypted files get a .muhstik extension, the attack locks victims out of their files unless they pay a ransom by a given date. Frömel, a German programmer, shared the fruits of his hacking labor on Twitter and Bleeping Computer’s forum, providing victims with their decryption keys as well as a decryptor tool they would also need to restore their files. Hacking back may have served justice in this case, but it’s not necessarily the right approach for all victims, says Avast Evangelist Luis Corrons. “A better approach might be to contact law enforcement instead of going public,” Corrons says. “Although it could take longer, chances are that the cybercriminals behind ransomware could be charged and arrested.”

This week’s stat

Companies that reported above-average diversity on their management teams also reported innovation revenue that was 19 percentage points higher than that of companies with below-average leadership diversity. Read Robin Selden on rethinking diversity.

FBI warns attacks can bypass multi-factor authentication

The FBI warned in a security advisory of the rising threat of cyberattacks that circumvent MFA (multi-factor authentication), ZDNet reported. MFA is an extra security protocol offered by many online accounts in which users validate their identity through an extra step, such as a PIN sent to their phone or an additional security question to answer. The FBI specifically called out SIM swapping, MFA webpage vulnerabilities, and targeted attacks by credential-stealing phishing tools as the leading methods used by cybercriminals. The FBI said MFA remains a powerful safeguard, and Avast’s Corrons agreed: “MFA is a must, and cybercriminals will first go after the low hanging fruit of people not using it.” Strong passwords remain a powerful defense before attackers reach the MFA stage of a hack. Learn more about strong passwords here.

This week’s quote

"Low awareness of the problem is a problem, as well. At Avast, we believe people should have more control personally over their data and how it is manipulated." – Avast CEO Ondrej Vlcek on privacy risks related to AI and the IoT.
...  
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
DAEMON Tools software infected – supply ...
What happened? ...harlan4096 — 11:35
April 2026 Windows Update Breaks Third-P...
Microsoft has conf...harlan4096 — 07:29
Apple Adds End-to-End Encryption for RCS...
Apple has announce...harlan4096 — 07:28
uBOLite 2026.504.2301
uBOLite 2026.504.2...harlan4096 — 07:14
AnyDesk 9.7.2 for Windows
Version 9.7.2 for ...harlan4096 — 06:05

[-]
Birthdays
Today's Birthdays
No birthdays today.
Upcoming Birthdays
avatar (28)akiratoriyama
avatar (48)Jerrycix
avatar (40)awedoli
avatar (82)WinRARHowTo
avatar (38)owysykan
avatar (49)beautgok
avatar (39)axuben
avatar (45)talsmanthago
avatar (31)mocetor
avatar (46)piomaibhaict
avatar (51)kingbfef
avatar (38)izenesiq
avatar (40)ihijudu
avatar (45)tiojusop
avatar (42)Damiennug
avatar (40)acoraxe
avatar (49)contjrat
avatar (41)axylisyb
avatar (44)tukrublape
avatar (41)iruqi
avatar (42)saitetib
avatar (36)ypasodiny
avatar (39)omapek
avatar (48)Geraldtuh
avatar (44)knigiJow
avatar (46)1stOnecal
avatar (50)Mirzojap
avatar (36)idilysaju
avatar (45)xclubDum
avatar (41)Stewartanilm
avatar (40)GregoryRog
avatar (45)mediumog
avatar (40)odukoromu
avatar (46)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>