Close Menu
  • News
  • Counties
  • International News
  • Sports
  • Technology and Innovation
  • Our Forum
  • Contact Us
Facebook X (Twitter) Instagram
Trending
  • Italy’s Moltiply sues Google in 3 billion euro lawsuit over market dominance
  • Pinterest shares surge as strong ad spend defies tariff uncertainty
  • Activist investor Engine Capital ends campaign at Lyft, withdraws board nominees
  • Why youngster Athena has bright future
  • FKF-PL: Kenya Police look to maintain top spot as Shabana seek redemption
  • Golfers ready to tee off at Nyanza Club for Kisumu tourney
  • What MPs should do to avoid people’s wrath over Finance Bill
  • Opposition’s demise? New allies, old mindset
Facebook X (Twitter)
Breaking Kenya News
Leaderboard Ad
  • News
  • Counties
  • International News
  • Sports
  • Technology and Innovation
  • Our Forum
  • Contact Us
Breaking Kenya News
You are at:Home»News»Beware new ransomware attack variants .eight, Clop
News

Beware new ransomware attack variants .eight, Clop

By December 27, 2021Updated:December 18, 2024No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email

 

Cyber-attacks have been the biggest worry in the digital space with ransomware malware topping in the list globally, the most recent notorious variants being .eight and Clop.

Last year, ransomware attacks increased by 150 per cent from 2019 while ransom payments grew by 200 per cent.

The trend is up this year with multiple high-profile ransomware attacks targeting critical infrastructure such as banks and other businesses, as well as healthcare.

ALSO READ


  • Kaltum Guyo: Let politicians clean the streets

    Our Columnists 13 hours ago


  • Eric Ng’eno: It is time to ask if State is worth the taxes, power and respect we give it

    Our Columnists 13 hours ago

The attacks have grown in sophistication and ransom demands grown to tens of million dollars (paid in cryptocurrency) against sensitive data held as a hostage.

Ransomware is malware from cryptovirology that employs encryption to hold a victim’s information to ransom. A user or organisation’s critical data is encrypted so that they cannot access files, databases or applications.

A ransom is then demanded to provide access. A newly discovered crypto-virus variant, .eight, which belongs to the family of Phobos ransomware, is capable of targeting almost all the Servers and PCs running on Windows Server Operating System such as Windows Server 2008, 2008 r2, 2012 and Windows Operating System 8 and 10.

It encrypts all files, installed programs, softwares and data. It locks essential data such as documents, PDFs,images, videos, audios and PDFs using a strong cryptography and appends the “.eight” extension to the filename. The data can only be opened with the decryption key or tool kept on the attackers’ server.

The ransomware leaves a ransom note titled “info.txt” on the desktop that has the contact email addresses of the attackers and a pop-up window demanding ransom in form of bitcoins for the attacker to give out the required decryptor.

The price depends on how fast you contact the hackers but ranges between $1,500 and $2,000. They offer to decrypt a few files for free as a demo.

The .eight authors also warn victims not to rename the data or try to access them via third-party software lest it cause permanent data loss or increase decryption price.

Internet users are warned and advised to always exercise best practice systems security mechanisms.

When accessing the web and downloading, installing or upgrading software, take precautions like not opening email attachments and web links or enabling macros from an unknown or untrustworthy account.

In case of an attack, isolate the infected data and use only recommended decryption tools or implemented functions from official program developer companies, not unofficial software update tools.

Install reliable end-point security software, anti-viruses or anti-spyware software. Employ a data backup and recovery plan for all critical information. Regularly perform and test backups to limit the impact of data or system loss and expedite recovery.

Today’s organisations rely on their proprietary data to make critical business decisions, utilising powerful algorithms to derive invaluable insights from the unstructured data they have gathered from customers, researchers and competitors. Protection of such a valuable commodity is critical.   BY DAILY NATION  

NEWS
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Kalonzo slams Ruto over IEBC nominee: ‘Low-trust institution in the making’

I have withdrawn my candidacy for the position of UoN VC – Professor Bitange Ndemo

I’m not a government project, activist Morara clarifies

Categories
  • business
  • Counties
  • ENTERTAINMENT
  • International News
  • News
  • OPINION
  • Sports
  • Technology and Innovation
  • Facebook
  • Twitter
  • Instagram
  • Pinterest
  • Popular
  • Recent
  • Top Reviews
March 17, 2018

Barclays launches mobile loan app

February 4, 2019

Hyena mauls boy to death in Laikipia, injures father

February 16, 2019

How corruption and impunity are aiding terrorism in Kenya

May 9, 2025

Italy’s Moltiply sues Google in 3 billion euro lawsuit over market dominance

May 9, 2025

Pinterest shares surge as strong ad spend defies tariff uncertainty

May 9, 2025

Activist investor Engine Capital ends campaign at Lyft, withdraws board nominees

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Authors
  • Contact Us
Copyright © 2025 ThemeSphere. Powered by WordPress.

Type above and press Enter to search. Press Esc to cancel.