A widely reported e-mail purporting to be a request to share a Google Docs document is actually a well-disguised phishing attack. It directs the user to a lookalike site and grants the site access to the target’s Google credentials.
WikiLeaks has published what it says is another batch of secret hacking manuals belonging to the US Central Intelligence Agency as part of its Vault7 series of leaks. The site is billing Vault7 as the largest publication of intelligence documents ever.
“If an attacker has a foothold in your air-gapped system, the malware still can send the data out to the attacker,” says Ben-Gurion researcher Mordechai Guri, who has spent years focusing on finding techniques for ferreting data out of isolated computer systems.
This malicious Word file marks the first time someone has attempted to compromise a Mac via macro abuse. While the malware isn’t particularly advance, there is no denying that macros are still highly effective when it comes to compromising a machine. Mac users should probably be extra vigilant when it comes to Word files from now on.
Usually, it is not the ransom itself, but business downtime and other consequences that will really disturb your business. Paying the possible ransom will of course hurt. But what will probably hurt more are the other repercussions to your business from a successful ransomware attack.