
On March 17, the FBI, the U.S. Treasury Financial Crimes Enforcement Network and the Department of the Treasury released a joint cybersecurity advisory about AvosLocker, a ransomware-as-a-service (RaaS) affiliate-based group. According to the advisory, AvosLocker has targeted victims across multiple critical infrastructure sectors, including finance, critical manufacturing and government facilities.
AvosLocker engages in what some call ‘double extortion’. These attacks begin by encrypting files and demanding a ransom to unlock the files. Then, the attackers threaten to leak the victim’s files on the darknet.
The AvosLocker leak site has posted many samples of stolen victim data. The group claims to have stolen data from targets in the United States, Syria, Saudi Arabia, Germany, Spain, Belgium, Turkey, the United Arab Emirates, the United Kingdom, Canada, China and Taiwan. If a victim does not pay the ransom, AvosLocker threatens to sell the data to unspecified third parties.
How AvosLocker Ransomware Works
AvosLocker ransomware starts by encrypting files on a victim’s server. The files are then renamed with the .avos extension. Next, the threat actors send ransom notes to the victims with a link directing them to an AvosLocker .onion payment site. Payments in Monero are preferred; however, Bitcoin is accepted for a 10-25% premium.
The FBI also states that AvosLocker actors may make phone calls to victims to direct them to the ransom payment site. Some victims have reported that AvosLocker threat actors are willing to negotiate reduced ransom payments.
Vulnerabilities Connected With AvosLocker
Multiple reports have revealed on-premise Microsoft Exchange Server vulnerabilities as the likely intrusion vector. Some specific vulnerabilities include Proxy Shell vulnerabilities associated with CVE-2021-31207, CVE-2021-34523, CVE-2021-34473 and CVE-2021-26855. The level of intrusion vector sophistication likely correlates to the skillset of the AvosLocker affiliate who started the attack.
Mitigating AvosLocker Threats
To thwart AvosLocker attacks, the joint advisory offers a variety of mitigation tactics. They include:
- Maintain multiple copies of sensitive or proprietary data and servers in physically separate, segmented and secure locations (hard drive, storage device, the cloud)
- Implement network segmentation and maintain offline, password-protected data backups. This ensures limited disruption in case of an attack.
- Keep copies of critical data separate from the system where the data resides
- Install and update antivirus software on all hosts and enable real-time detection
- Install updates and patches to operating systems, software and firmware in a timely manner and stay up to date about new updates and patches
- Review domain controllers, servers, workstations and active directories for new or unknown user accounts
- Audit and configure user accounts with least privilege in mind. Limit admin privilege only to those who need it and only for as long as they need it.
- Disable unused ports
- Consider adding an email banner to emails received from outside your group
- Disable all hyperlinks in received emails
- Use multi-factor authentication where possible
- Use strong passwords, change passwords often and do not reuse passwords to network systems and accounts
- Require admin credentials to install software
- Only use secure networks and avoid using public Wi-Fi networks. Consider installing and using a virtual private network.
- Focus on awareness and training about ransomware and phishing scams.
Additional Resources Against Ransomware
The FBI also provides other resources to help fight against ransomware. These include CISA’s Stop Ransomware site and CISA’s Ransomware Guide.
more from News
FBI Releases AvosLocker Ransomware Advisory
On March 17, the FBI, the U.S. Treasury Financial Crimes Enforcement Network and the Department of the Treasury released a joint cybersecurity advisory about AvosLocker, a ransomware-as-a-service (RaaS) affiliate-based group. According to the advisory, AvosLocker has targeted victims across multiple critical infrastructure sectors, including finance, critical manufacturing and government facilities. AvosLocker engages in what some […]
US Congress Approves Strengthening American Cybersecurity Act
Federal agencies and critical infrastructure owners and operators may need to change how they respond to cyber attacks. The U.S. Congress passed new legislation mandating they report attacks within 72 hours. In addition, it requires them to report ransomware payments within 24 hours. Provision Impacts 16 Critical Infrastructure Sectors This new federal legislation was also influenced […]
Attackers Used Malicious Telegram Installer to Distribute Purple Fox Rootkit
Threat actors leveraged a malicious Telegram installer to infect users with the Purple Fox rootkit. A Case Study in Evasion With the help of MalwareHunterTeam, Minerva Labs looked into a malicious Telegram installer and found that it was a compiled AutoIt script called ‘Telegram Desktop.exe.’ The script created a new folder and dropped both a […]
Over 1,200 Phishing Kits Found in the Wild With Ability to Steal 2FA Codes
Academics discovered more than 1,200 phishing kits equipped with the ability to intercept users’ two-factor authentication (2FA) codes in the wild. Two Types of 2FA Phishing As noted by researchers from Stony Brook University sponsored by security firm Palo Alto Networks, many of the toolkits referenced above used what’s known as man-in-the-middle (MitM) phishing. These […]
Source of this news: https://securityintelligence.com/news/fbi-releases-avoslocker-ransomware-advisory/
Related posts:
Will humans worship artificial intelligence (AI) in the near future? In less than two decades, machines have outclassed humans. The development of full artificial intelligence could spe...
VPNs and proxies both obscure your internet protocol (IP) address, making it seem as though you are browsing from a different location. However, while they may have some similar benefits (like spoofi...
WordPress managed hosting provider WP Engine announced that it is ending support for .htaccess directives. WP Engine has started End-of-Life (EOL) processes for winding down the use of .htaccess on t...
words Alexa Wang Data is being generated more than ever. The main reasons for that are the development of digital technologies and the internet, and it’s an excellent opportunity for businesses worl...
What Is A Circular Economy?A Bitcoin circular economy is a free market where you can trade any products or services for bitcoin, including daily needs like food, jobs and housing.The state censors fi...
UAE is a business hub acknowledged for its sleek skyscrapers. At the moment, UAE’s new political environment is getting influenced because of new cybersecurity threats.As per gulf businesses, four ou...
FILED PURSUANT TO RULE 424(b)(4)REGISTRATION NO. 333-260748 PROSPECTUS $174,000,000 Vahanna Tech Edge Acquisition I Corp. 17,400,000 Units Vahanna Tech Edge Acquisition I Corp. is a newly inco...
Since I started learning about computers I have heard many experienced users saying Linux is impenetrable, Linux offers the best security, and such. It is partly true that Linux offers various se...
Dallas Invents is a weekly look at U.S. patents granted with a connection to the Dallas-Fort Worth-Arlington metro area. Listings include patents granted to local assignees and/or those with a N...
If when you try to install a Feature Update via Windows Update on your Windows 11 or Windows 10 computer, the update installation fails with error code 0x80244018, then this post is sure to help you....
Do you love collecting athletic shoes? Are you thinking of joining the trainer reselling industry? There are a few things to consider sooner than taking the plunge into copping boots to resell ...
Yesterday was a very busy day in Yankeeland. The busiest it will get until the Winter Meetings, most likely, or until they make a big splash in free agency. First, the Yankees re-signed Aaron Boon...
Two young men from the eastern United States have been hit with identity theft and conspiracy charges for allegedly stealing bitcoin and social media accounts by tricking employees at wireless phone ...
Alzheimer’s Disease ● Amyotrophic Lateral Sclerosis (ALS) ● Dementia ● Epilepsy & Seizures ● Multiple Sclerosis (MS) ● Parkinson's Disease ● Other Neurological & Nervous System Disturbances T...
A new ransomware gang, known as LockFile, uses a recently published ProxyShell vulnerability to encrypt a Windows domain after hacking into a Microsoft Exchange server. ProxyShell is the name of an ...
reader remarks 63 with 46 posters joining Percentage this story Almost exactly a year ago, surveillance researchers uncovered one of the worst document breaches during modern ...
The question of roa safety on the internet is quite important in this modern day. Every time you surf the Net, websites are hands down collecting your data, based on your amazing IP address. Firs...
Steam is one of the most popular and widely used gaming apps out there, and for good reason too. Not only can you play games there but also create them. While some games are free, others are to be pa...