Ethos Blog

Updates about the latest Tech News

New Borat malware could turn into ransomware, DDoS, and spy on PCs

A new malware has been identified as circulating and being sold to hackers, which is more dangerous than it appears. The 'virus' can become a tool for ransomware, DDoS attacks, and spying on computers and systems by recording audio and videos. Know more. A security company has identified this new remote access Trojan called Borat, like the Kazakh character played by comedian Sacha Baron Cohen, as malware that "provides a dashboard for Threat Actors (TAs) to perform RAT activities and also has the option to compile the malware binary to perform DDoS and ransomware attacks on the victim's machine". How does it work? Borat works as a kind of malware toolbox, with several different functions that allow different cybercrimes to be carried out. In this way, the person responsible for the attack can modify, using simple commands, the damage caused by the malware on the victim's computer, as needed. From a...

Continue reading
  685 Hits

What is Ransomware

What could be worse than a hacker breaking into the entire data system of your company and taking everything from you? Certainly a hacker breaking into your data system and asking for a ransom to bring your data back. And in case you don't pay the ransom, you could lose everything. The name of this type of cyber attack is ransomware, and it can be a big problem for you and your business if you don't have adequate protection. How a ransomware attack happens What makes ransomware so difficult to detect is because it is always very ‘masked’. This malware can be installed on your computer via malicious websites, suspicious links via email, or installation of vulnerable apps. Ransomware can also appear in links sent by social networks, wildly used to spread viruses today. Once downloaded and opened, a malicious program installs itself and takes control of your data storage. One...

Continue reading
  891 Hits

Cohesity Backup Solutions

Nowadays having data protection together with backup, helps to easily recover them in case something happens, and is indispensable for companies that do not want to suffer attacks on their Infrastructure, which we believe is the case of your company. To prevent attacks, create backups, and keep it safe you need a reliable solution like the one Cohesity offers. What is backup? Backup is the process of duplicating data and storing it in a secure place in case of loss or damage. Ideally, this backup copy (often called a snapshot) is immutable, meaning it cannot be altered after it is created to protect against mutations such as ransomware. We have 3 types of backups: Full backups – The most basic and complete type of backup. As the name implies, this type of backup makes a copy of all data to a storage device, such as a disk or tape. The primary...

Continue reading
  747 Hits

Thousands of Malicious Emails Received by UK Government Officials

A report released in April revealed that UK government officials receive thousands of malicious emails a year. Email is still the most utilized and practical way for criminals to disseminate malicious links and attachments to access company's systems around the world. If you click on one of these links or attachments, your company's data could be stolen and you could be conditioned to pay a ransom for that data back. It is not only large companies and institutions such as government departments that are targeted by these criminals. Always be cautious and instruct your employees to be vigilant. The good news is that in the same way that attacks advance, Cohesity also advances by always being ahead of these criminals to help your company avoid or recover from an attack. Contact us to find out more!

  817 Hits

The Worst Ransomware Attacks in 2021

The year 2021 was marked by worst ransomware attacks, such as the attack on JBS Foods and Colonial Pipeline, causing loss of data and money for the affected companies. We've gathered the worst ransomware attacks of the last year in this post with some tips for your business to avoid this kind of headache. What is a Ransomware Attack? According to the U.S. Government’s Cybersecurity and Infrastructure Assurance Agency (CISA): “Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. Ransomware actors often target and threaten to sell or leak exfiltrated data or authentication information if the ransom is not paid.”In general words, it is a type of 'data kidnapping' where criminals act through cybernetic attacks to invade systems and steal such data and ask for money...

Continue reading
  926 Hits