Good news ! Hackbusters community is waiting for you !
KnowBe4 has been running the HackBusters site for a few years now, providing you with trending IT security news. We are expanding it and have launched a new exciting online community! The forum is divided into four main topics or categories: Social Engineering, Ransomware, Phishing and Security Awareness Training. You are invited to be one of the first to join us at:

Cover Your NAS Against Nasty Cr1ptT0r Ransomware


Endpoint Security , Fraud Management & Cybercrime , Ransomware

Cover Your NAS Against Nasty Cr1ptT0r Ransomware Crypto-Locking Extortion Targets Internet-Exposed D-Link Devices Mathew J. Schwartz (euroinfosec) • March 15, 2019 Internet-connected D-Link devices, including network-attached-storage enclosures, are being crypto-locked by Cr1ptT0r ransomware. (Sources: Coveware, D-Link)

Criminals wielding a new strain of ransomware called Cr1ptT0r are targeting network-attached storage users.

See Also: Live Webinar | Passwords: Here Today, Gone Tomorrow? Be Careful What You Wish For.

The NAS-targeting ransomware campaign was first discovered in February after owners of D-Link DNS-320 network storage enclosures took to the forums of Bleeping Computer to report that their devices had been crypto-locked.

As the publication reported, while D-Link still supports the two-bay NAS product, the vendor last issued a firmware update in 2016 to fix a known security flaw. Older...(continued)

View All Trending Stories