04-28-2020 , 02:54 PM
Quote: The attack accuses victims of possessing pornography, encrypts all files on the device, and then instructs them to pay a fine to unlock the data, according to Check Point Research.
Ransomware attacks all generally follow the same playbook.
The attacker encrypts or locks sensitive files on your computer or device and demands a ransom in order to unlock them.
In most cases, the criminals behind the attack make no attempt to masquerade their identity, confident in their ability to convince enough people to pay the ransom.
But one new malware campaign analyzed by cyber threat intelligence provider Check Point Research spoofs the FBI to lend an air of legitimacy to the ransom demand.
READ MORE »
Source