Sunday, February 5, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > LockBit ransomware disguises as a copyright claim

LockBit ransomware disguises as a copyright claim

LockBit ransomware affiliates trick the victims into contaminating their systems by disguising their malware as copyright claims.


Hanife Diktas Hanife Diktas
June 27, 2022
2 min read
LockBit ransomware disguises as a copyright claim

It has been reported that the LockBit 2.0 ransomware affiliates are using a peculiar scheme to get victims into infecting their machines camouflaging a virus as copyright claims. The new attempt was noticed by analysts at AhnLab, Korea which expose cyber attackers disguising malware as copyright claims.

How does the disguise work?

The mischievous worm in question is the LockBit 2.0 ransomware that will encode the infected devices before the attackers eventually request payment. The receivers of copyright claim emails are supposedly making use of media files without the creator’s license. The recipients are demanded to remove the infringing content from their websites or they will encounter legal action.

Apparently, an attachment with a password-protected ZIP archive compressed file is sent to the victims, consecutively has a workable disguised as a PDF document, in fact, is an NSIS installer. The folder and password protection is to avoid exposure from email security tools. When the recipient opens the infected “PDF” to find out what images are having copyright claims, the malware will load and encrypt the device with the LockBit 2.0 ransomware.

Many malware distribution campaigns use the same techniques. This is not too sole for the LockBit group. According to NCC ‘Threat Pulse May 2022 ‘ report, Lockbit 2.0 continued its dominance as a threat actor, covering 40% of attacks in May.

Victims listed by each ransomware operation in May 2022

The top sectors targeted in May were industrial, making up some 31% of ransomware attacks, followed by consumer cyclical (22%) and technology (12%). The report also stated that the number of ransomware attacks fell in May. In total, it found 236 attacks in May, an 18% decrease from the 289 attacks in April. The increase may be a result of Russia-based Conti’s back off from the ransomware scene, as well as its cooperation with minor groups including Black Basta and Hive.

Lockbit 2.0 has located its place as the most creative threat actor of 2022. Businesses must familiarise themselves with their campaigns, techniques, and procedures. This will give them a better understanding of how to shield themselves against the attack and the most effective security measures to apply.

See more Cybersecurity News


Tags: AhnLab Security EmergencyRansomware
Hanife Diktas

Hanife Diktas

Hanife Diktas is a news editor at Cloud7 News. Hanife started her career in the manufacturing sector in the marketing and sales department. Hanife worked in industrial equipment, renewable energy, and technology sectors. Hanife Diktas did her bachelor's degree in business administration and completed a master's degree in management at Yeditepe University in Istanbul, Turkey. Hanife is a Linux user, and she also contributed to AlmaLinux OS at the beginning of the project. Hanife focuses on web hosting, cloud computing, data centers, cybersecurity, Linux OS, and virtualization technologies. Hanife enjoys creating content and shooting videos covering these topics.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Linux Kernel 5.19 RC4 released

Linux Kernel 5.19 RC4 released

Related News

Total of 310,855,487 accounts were leaked in 2022

Total of 310,855,487 accounts were leaked in 2022

February 5, 2023 6:00 pm
Almond announces the acquisition of Amossys

Almond announces the acquisition of Amossys

February 5, 2023 12:00 pm
LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Total of 310,855,487 accounts were leaked in 2022
  • HostPapa signs deal with Deluxe Corporation
  • Noventiq closes DigiTech acquisition
  • Almond announces the acquisition of Amossys
  • Keepit announced the launch of its backup and recovery solution for Power BI

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.