article thumbnail

Network Break 274: Let’s Encrypt Revokes Millions Of Certificates; Microsoft Pitches SMB Over QUIC

Packet Pushers

Let's Encrypt revokes millions of digital certs, Microsoft proposes SMB over QUIC for file access without a VPN (and an easier way to get through firewalls), big vendors offer extended free trials of conferencing software for companies considering remote work, Microsoft pays hourly workers full salaries during work slowdowns, and more.

SMB 52
article thumbnail

Cato’s Ransomware Lab Births Network-based Ransomware Prevention

CATO Networks

Once found, Cato automatically blocks SMB traffic from the source device, preventing lateral movement or file encryption, and notifies the customer. Join one of our Cyber Security Masterclasses | Go now Whats being introduced today are heuristic algorithms specifically designed to detect and interrupt ransomware.

SMB 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

WannaCry II: How to Stop NotPetya Infections with the Cato Cloud

CATO Networks

Like WannaCry, NotPetya leverages the SMB protocol to move laterally across the network, an EternalBlue exploit attributed to the National Security Agency (NSA) and leaked by the Shadow Brokers hacking group last April. The machine is then forced to reboot, encrypting the files and locking the computer. A total of 3.8

SMB 52
article thumbnail

How to Stop WannaCrypt Infections with the Cato Cloud

CATO Networks

But what makes the attack so unusually virulent is how it exploits a vulnerability in the Windows SMB protocol. SMB is used by Windows machines for sharing files and the ransomware uses SMB to spread to other vulnerable devices on a network. Once installed, the ransomware encrypts the files on the machine.

SMB 52
article thumbnail

How to Protect from Ransomware with SASE

CATO Networks

Data Encryption According to Cybercrime Magazine, the global cost of ransomware damages will exceed $20 billion in 2021 and $265 Billion by 2031. One of the ways attackers gain these amounts is encrypting organizational data, and requiring a payment for instructions on how to decrypt it.

SASE 52
article thumbnail

Cato CTRL Threat Research: Sophisticated Data Exfiltration Tools Used in Double Extortion Ransomware Attacks by Hunters International and Play 

CATO Networks

Executive Summary Modern ransomware attacks have evolved beyond simple encryption to deploy sophisticated double extortion tactics. Threat actors now systematically exfiltrate sensitive data before encrypting systems, ensuring leverage even when victims have robust data backups. GreenCollector tool (identified as fs256.exe)

SMB 40
article thumbnail

Cato Research Decrypts the News Behind February Security Events

CATO Networks

The POC was able to generate the so called Blue Screen of Death on Windows clients that connects into a compromised SMB server. Vulnerabilities in SMB servers should be treated very seriously. If attackers compromise an SMB server in the organization, they can exploit SMB vulnerabilities as part of wider lateral movement.

SMB 52