Increase in Magniber Ransomware Attacks Affects Home Users Globally

 

A widespread Magniber ransomware campaign is currently targeting home users globally, encrypting their devices and demanding ransoms amounting to thousands of dollars for decryption.
Launched in 2017 as the successor to the Cerber ransomware operation, Magniber was initially distributed through the Magnitude exploit kit. Since then, the operation has experienced intermittent bursts of activity, utilizing various distribution methods to infect devices. 
These methods include exploiting Windows zero-day vulnerabilities, fake Windows and browser updates, and trojanized software cracks and key generators. Unlike larger ransomware campaigns, Magniber predominantly targets individual users who unknowingly download and execute malicious software on their personal or small business systems.
In 2018, AhnLab developed a decryptor for Magniber ransomware, but it is no longer effective as the threat actors have since fixed the vulnerability that allowed for free file decryption.
Since July 20, BleepingComputer has observed a significant increase in victims seeking assistance on its forums due to Magniber ransomware infections.
The ransomware identification site ID-Ransomware has also reported nearly 720 submissions since July 20, 2024. Although the exact infecti

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: