{"id":239362,"date":"2023-04-24T18:49:10","date_gmt":"2023-04-24T13:19:10","guid":{"rendered":"https:\/\/blog.forumias.com\/?p=239362"},"modified":"2023-04-24T19:17:08","modified_gmt":"2023-04-24T13:47:08","slug":"what-is-lockbit-ransomware-and-how-is-it-specifically-targeting-apple-computers","status":"publish","type":"post","link":"https:\/\/forumias.com\/blog\/what-is-lockbit-ransomware-and-how-is-it-specifically-targeting-apple-computers\/","title":{"rendered":"What is LockBit ransomware and how is it specifically targeting Apple computers?"},"content":{"rendered":"\n<p><b>Source: <\/b><span style=\"font-weight: 400;\">The post is based on the article <\/span><b>\u201cWhat is LockBit ransomware and how is it specifically targeting Apple computers?\u201d <\/b><span style=\"font-weight: 400;\">published in <\/span><b>The Hindu <\/b>on <b>24th April 2023<\/b><\/p>\n<h2><b>What is the News?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Reports<\/span><span style=\"font-weight: 400;\"> have emerged that LockBit ransomware was found to be targeting Mac devices.<\/span><\/p>\n<h2><b>What is LockBit ransomware?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">LockBit ransomware was first reported in 2019. It has been dubbed as the \u201cabcd\u201d virus due to the file extension used when encrypting victims\u2019 files.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is designed to infiltrate victims\u2019 systems and encrypt important files. The virus is categorized as a \u201ccrypto virus\u201d due to its requests for payment in cryptocurrency to decrypt files on the victim\u2019s device.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ransomware is therefore typically deployed against victims who feel hindered enough by the disruption to pay heavy sums in exchange for access to the files and can afford to do so.<\/span><\/p>\n<h2><b>How does LockBit ransomware work?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">It works as a self-spreading malware, not requiring additional instructions once it has successfully infiltrated a single device with access to an organizational intranet.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is also known to hide executable encryption files by disguising them in the .png format, thereby avoiding detection by system defences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Attackers use phishing tactics and other social engineering methods to impersonate trusted personnel or authorities to lure victims into sharing credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once it has gained access, the ransomware prepares the system to release its encryption payload across as many devices as possible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It then disables security programs and other infrastructures that could permit system data recovery. The goal is to ensure that data recovery without assistance from the LockBit gang is impossible.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After this, they leave behind a ransom note, with instructions to restore the system, and has reportedly also included threatening blackmail messages.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Victims are then left with no choice but to contact the LockBit gang and pay up for the data, which the gang may sell on the dark web \u2014 whether the ransom is paid or not.<\/span><\/p>\n<h2><b>How one can protect systems against LockBit ransomware?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Organizations and individuals can take certain steps to increase resilience against such cyber threats such as:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 Use of strong passwords, with strong variations of special characters which are not easy to guess along with multi-factor authentication should be implemented.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 Undertake training exercises to educate employees on the use of phishing attacks and their identification.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 Old and unused user accounts should be deactivated and closed as they can become weak links in the security apparatus.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u2013 Organizations should have an understanding of cybersecurity threats and vulnerable points that may be exploited by cybercriminals.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Source: The post is based on the article \u201cWhat is LockBit ransomware and how is it specifically targeting Apple computers?\u201d published in The Hindu on 24th April 2023 What is the News? Reports have emerged that LockBit ransomware was found to be targeting Mac devices. What is LockBit ransomware? LockBit ransomware was first reported in&hellip; <a class=\"more-link\" href=\"https:\/\/forumias.com\/blog\/what-is-lockbit-ransomware-and-how-is-it-specifically-targeting-apple-computers\/\">Continue reading <span class=\"screen-reader-text\">What is LockBit ransomware and how is it specifically targeting Apple computers?<\/span><\/a><\/p>\n","protected":false},"author":10317,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"footnotes":""},"categories":[1566,1738,9],"tags":[10498],"class_list":["post-239362","post","type-post","status-publish","format-standard","hentry","category-daily-factly-articles","category-science-and-technology-daily-factly-articles","category-public","tag-the-hindu","entry"],"jetpack_featured_media_url":"","views":{"total":0,"cached_at":"","cached_date":1704134589},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/239362","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/users\/10317"}],"replies":[{"embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/comments?post=239362"}],"version-history":[{"count":0,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/posts\/239362\/revisions"}],"wp:attachment":[{"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/media?parent=239362"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/categories?post=239362"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forumias.com\/blog\/wp-json\/wp\/v2\/tags?post=239362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}