An growth of ransomware “SamSam”, aka MSIL/Samas.A (or variants: SamSam1, SamSam2, SamSam3 andSamSam4), was discovered and it targeted industries and critical infrastructures worldwide.
Accordingly to US-CERT report, cyber actors use either brute forace attacks or stolen login credentials, some even were purchased from known darknet marketplaces, to get the RDP credentials. Then, they will make use of the Remote Desktop Protocol (RDP) to gain persistent access to a particular network, drop the malware onto the systems inside the network and run executable file to encrypt the systems, finally, a ransom note will be left for directing the victims to pay the ransom.
Please DO NOT respond to any kidnapper by attempting payment and instead to report the incident to ITSC and the Police.
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |