Jump to content

New ransomware BlackByte and Malware Bytes


Recommended Posts

The best way to protect you from any ransomware attack or any other malware is to avoid it in the first place.

Yes Malwarebytes does. https://blog.malwarebytes.com/detections/ransom-blackbyte/

Do not open any email attachment unless you are expecting that attachment from that sender at that specific time.

Do not open links in email, open a new tabb and go to the site directly.

Do not install software or games from anywhere except the actual publisher of the software.

Do not download from Torrent sites.

Use a supported OS and keep it fully up to date.

Finally, keep a backup of your files on an external drive that is NOT ALWAYS connected to the computer or network.

I prefer full OS images so you can do a full drive restore if needed.

23 hours ago, mt1000 said:

ransomware going around called BlackByte

As for BlackByte, it is targeting Exchange servers not the general public.

For now, Ransom.BlackByte seems to use a known Microsoft Exchange Server vulnerability to establish a first base and use worm like capabilities to spread across a network.

Quote

WWhat can organizations do to protect themselves?

If you're running a version of Exchange that is vulnerable, you should implement the various patches from Microsoft as soon as possible. Better yet, you should put together a plan to either move to the most current Exchange version or switch to either Office365 or Google Workspace as soon as possible.

You should also ensure that your backups are valid and can be used to restore your servers. Also, if you haven’t isolated your Exchange server on a separate network segment, now may be a good time to investigate how to do this to minimize potential email-borne threats. This is apparently what the 49ers did and is likely the reason why their entire network infrastructure wasn’t damaged by BlackByte.

 

Edited by Porthos
Link to post
Share on other sites

Hello @mt1000 and welcome back:

When well known malware has been in the wild since July, 2021 as has the likes of Ransom.BlackByte, you can believe that responsible, top tier, A/V and OS providers have mitigated the threat quite soon after its discovery.

HTH

FWIW: One BlackByte victim, (San Francisco 49ers) is within easy walking distance of Malwarebytes headquarters. Pity.

Edited by 1PW
Link to post
Share on other sites

4 hours ago, claudiubo said:

Seriously??????  

This is your best answer for the OP????

The BEST defense against any malware is not software.  It is the person and the person's actions and/or inactions.

All the software in the world will not protect one if they don 't have situational awareness and don't practice Safe Hex.

So in effect Yes @claudiubo

Edited by David H. Lipman
Edited for content, clarity, spelling and/or grammar
  • Like 1
Link to post
Share on other sites

3 hours ago, David H. Lipman said:

The BEST defense against any malware is not software.  It is the person and the person's actions and/or inactions.

All the software in the world will not protect one if they don 't have situational awareness and don't practice Safe Hex.

So in effect Yes @claudiubo

"any other malware is to avoid it in the first place."

 

If a regular user can " avoid it in the first place" we wouldn't need Malwarebytes and "Experts"......

The OP question was simple: "Am I protected by MalwareBytes?"

The answer was supposed to be Yes or No.

No need for a philosophical dissertation.....

Link to post
Share on other sites

Guest
This topic is now closed to further replies.
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.