Home » Antivirus » Databases attacked by Cerber Ransomware

Cerber is one of the renowned ransomware attacks. It has promoted itself to also attack databases. It is accessible for buying as a facility (ransomware as a facility) on the “dark net” as share of an associate package. Cerber is portion of a turnkey facility in which customers share 40% of their incomes with the developers. In turn, the Cerber group does all the effort on the back end to make it easy for their buyers to spread the malware and accept expenses from victims, minus the overhead charges.

Databases attacked by Cerber Ransomware

This update is important. It expands the skills to not only targeted clients, but now to companies as well. This shift is the newest trend with the top ransomware families. Hackers have understood that though customers may pay $300–$500 for their data, companies will may much more. As most hackers do, they follow the money.

Major changes 

The newest version of Cerber has made three vital changes. The malware now changes the allowances of encoded files to a random four characters. Earlier it altered the extension of changed files to .cerber3. This alteration makes it tougher to scan for pretentious files.

Second, a new HTML executable file exhibits the ransom note and commands in a window. It is cleaner, offers links, and is more specialized looking. This may provide victims more assurance that they are trading with experts and should assume to obtain a key to unlock their documents if they pay.

Lastly, and most essential, the malware now tries to stop database procedures running on the target device so it can encrypt the data. This is an important shift in focus from clients to companies, which usually run databases having important functioning data. When database files are open and in use by software, they cannot simply be encrypted. Cerber tries to close the database software so the records can be encrypted.

Big business

Security professionals believe Cerber is based in Russia as it avoids device structure in the Russian language. But it has the rest of the globe to attack, and it does well. Approximations vary, but incomes appear to range from $2 million to $2.5 million every year. In last month, Check Point Software and Insights tracked over two hundreds campaigns active with eight new ones launched every day. In last year, they tracked 150,000 new PC infections, with an average ransom demand of one Bitcoin.

Cerber in action

Cerber designers are pushing the next expansion of ransomware by targeting after database files. Admins, watch your database procedures for unanticipated stops. It might be a sign of Cerber ransomware trying to weaken file integrity. But that would be the wrong time to consider instituting good backups and applying good security software. Antivirus will help your PC to stay protected from the virus and ransomware that accidentally comes into your PC. The Norton Antivirus has a good hold in the market and is one of the best. To get any assistance regarding antivirus, call Norton Antivirus support.

The best strategic cyber-security capability method includes components to Predict, Prevent, Detect, and Reply to risks. This holds true for defense against ransomware. A solid data backup/restoration competence is significant, as is quality anti-malware to block attacks. Behavioral controls to teach users will ease the largest infection vector: people opening diseased phishing emails. Rapid detection and sensors must be present to rapidly raise the alarm for variants that cannot be stopped. Retrieval teams with clear procedures, tools, and backups must then get things back to normal. Ransomware is not simple to defeat, but the first step it to have a complete plan and resources. Cerber and others will continue to change. Therefore, your safety must be just as active.

About