A new Ransomware is affecting India, reports eScan!

Last year WannaCry ransomware created havoc across the globe and due to its lateral movement; it had penetrated into the networks and skipped across the countries and continents. Furthermore,  due to its ability to move across networks, eScan observes that it still exists in its dormant form.

eScan’s telemetry servers have been picking up reminiscent artefacts of WannaCry Ransomware on regular basis. Over the period of last few months, we have observed a steady decrease of incidents involving WannaCry and hopefully by the year end WannaCry should meet the same fate as that of Conflicker Worm / DNS Changer Botnet.

They have been observing various variants and newer Ransomware being added into the family, however very few have seen active development, viz. GandCrab. In last few weeks, GandCrab has taken a center-stage and is evolving at a much faster rate, which suggests that the Ransomware Developer/ Criminal nexus is growing stronger and many of the criminals are now switching their loyalties to GandCrab due to the sheer fact that the developers are taking keen interest and adding numerous weapons to its arsenal.

The next step of evolution for Ransomware would be Crypto miners with Info stealers and a Ransomware all bundled into one.

India has seen its share of Ransomware attacks and Maharashtra leading the way for the week, however, in states like Gujarat, Telengana, Uttar Pradesh and Kerala we have observed a rise in activity of the GandCrab Ransomware Attacks while xtbl, korean, Dharma and CrySiS variants of Ransomware family are still making rounds.

To stay safe from such ransomware attacks, all the organizations and users need to ensure that, the patches released by Microsoft have been updated or patched immediately. Organizations should deploy and maintain a backup solution. Most importantly, Organizations should implement MailScan at the Gateway Level for mail servers, to contain the spread of suspicious attachments.

Leave a Reply

Your email address will not be published. Required fields are marked *