March 17th, 2018 By Paul Ducklin
Recently, we’ve seen crooks using the sort of techniques typically attributed to nation-state, spy-service, secret-squirrel attackers.
However, instead of sniffing around carefully for days, weeks, months or years to see what secrets, passwords, intellectual property or whatever else they can get…
…these crooks go straight at money-making schemes.
Examples include the WannaMine worm, which uses WannaCry’s exploit-based spreading techniques to steal your CPU power and electricity to go cryptomining, and the SamSam ransomware, where crooks simultaneously encrypt as many of your computers as they can in the hope of squeezing you for a bigger payout.
We went on Facebook Live to explain how this new wave of cybercrime usually unfolds, and to give you Five Ps to protect yourself:
Full Article and video.
Login to the community
No account yet? Create an account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.