{"id":33054,"date":"2020-01-06T03:41:00","date_gmt":"2020-01-06T08:41:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=33054"},"modified":"2020-01-06T03:41:00","modified_gmt":"2020-01-06T08:41:00","slug":"fbi-issues-lockergaga-megacortex-ransomware-warning","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/01\/06\/fbi-issues-lockergaga-megacortex-ransomware-warning\/","title":{"rendered":"FBI Issues LockerGaga, MegaCortex Ransomware Warning"},"content":{"rendered":"\n<p>By Dan Kobialka &#8211; The\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.fbi.gov\/\" target=\"_blank\">FBI<\/a>\u00a0recently warned U.S. organizations about LockerGaga and MegaCortex <strong>ransomware<\/strong> attacks, according to\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fbi-issues-alert-for-lockergoga-and-megacortex-ransomware\/\" target=\"_blank\">BleepingComputer<\/a>. It also provided tips to help organizations guard against LockerGaga and MegaCortex.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2019\/01\/05\/10\/00\/personal-data-3914809__340.jpg\" alt=\"\" width=\"296\" height=\"191\"\/><\/figure><\/div>\n\n\n\n<p>LockerGaga and MegaCortex control an organization\u2019s network via exploits, phishing attacks, SQL injections and stolen login credentials, FBI noted. They then attempt to encrypt all network devices.<\/p>\n\n\n\n<p>In addition, LockerGaga and MegaCortex use the Cobalt Strike penetration testing tool to deploy \u201cbeacons\u201d on a compromised device, FBI stated. This allows the <strong>ransomware<\/strong> to perform various activities on a victim\u2019s device.<\/p>\n\n\n\n<p>Cybercriminals typically infect a victim\u2019s device with LockerGaga or MegaCortex but wait several months before they deploy the <strong>ransomware<\/strong>, FBI indicated. Once cybercriminals execute a LockerGaga or MegaCortex cyberattack, they stop an infected device\u2019s security program processes and services and disable Windows Defender scanning features and any security-related services.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/fbi-lockergaga-megacortex-warning\/&amp;ct=ga&amp;cd=CAEYByoUMTE2Nzk2NzIwNjQxMjg2NDA3NTEyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNF7wSJwmZ0e7C5zW9uDPu8iPgP1vw\">Read On:<\/a><\/p>\n\n\n\n<iframe style=\"width:120px;height:240px;\" align=\"right\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" frameborder=\"0\" src=\"\/\/ws-na.amazon-adsystem.com\/widgets\/q?ServiceVersion=20070822&#038;OneJS=1&#038;Operation=GetAdHtml&#038;MarketPlace=US&#038;source=ss&#038;ref=as_ss_li_til&#038;ad_type=product_link&#038;tracking_id=cyberconservi-20&#038;language=en_US&#038;marketplace=amazon&#038;region=US&#038;placement=B074TVLZPS&#038;asins=B074TVLZPS&#038;linkId=135df2d99e2bc16765a18e9103062c70&#038;show_border=true&#038;link_opens_in_new_window=true\"><\/iframe>\n","protected":false},"excerpt":{"rendered":"<p>By Dan Kobialka &#8211; The\u00a0FBI\u00a0recently warned U.S. organizations about LockerGaga and MegaCortex ransomware attacks, according to\u00a0BleepingComputer. It also provided tips to help organizations guard against LockerGaga and MegaCortex. LockerGaga and MegaCortex control an organization\u2019s network via exploits, phishing attacks, SQL <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/01\/06\/fbi-issues-lockergaga-megacortex-ransomware-warning\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-33054","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33054","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=33054"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/33054\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=33054"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=33054"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=33054"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}