Connect with us

Hi, what are you looking for?

News

How to prevent Lapsus$ ransomware attack – FBI

How to prevent Lapsus$ ransomware attack - FBI

Following sprees of cyberattacks by Lapsus$ hacking group using ransomware, the Federal Bureau of Investigation has released some preventive measures against the hackers.

Gadgets Africa reported that Lapsus$m one of the most talked about and feared hacker cyber-crime gangs, Lapsus$, added ride-hailing company, Uber, to its list of victims, forcing the firm to close its internal operations last Thursday.

Other tech firms which the hacking group run by teenagers has attacked include Microsoft, Samsung, T-Mobile, and Okta, amongst others.

After the successful T-Mobile hack, the hackers in April 2022 reportedly attempted to access the T-Mobile accounts of the FBI and the US Department of Defense.

However, IndiaToday reported that the hackers’ attempt failed due to additional verification measures that were in place on both the organisations’ digital presence.

As such, the FBI, according to MSSP Alert, issued the following 10 recommendations to organisations to prevent, avert or curtail ransomware cyber attacks from Lapsus$:

  1. • Back up critical data offline.
  2. • Ensure copies of critical data are in the cloud or on an external hard drive or storage device. This information should not be accessible from the compromised network.
  3. • Secure back-ups and ensure data is not accessible for modification or deletion from the system where the data resides.
  4. • Use multi-factor authentication with strong passwords, including for remote access services.
  5. • Keep computers, devices and applications patched and up-to-date.
  6. • Monitor cyber threat reporting regarding the publication of compromised VPN login credentials and change passwords and settings.
  7. • Consider adding an email banner to emails received from outside your organization.
  8. • Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.
  9. • Audit user accounts with administrative privileges and configure access controls with least privilege in mind.
  10. • Implement network segmentation.

Click to comment

Leave a Reply

Your email address will not be published.

You May Also Like

Cryptocurrency

A former Chairman of First Bank of Nigeria Limited, Ibukun Awosika, has been appointed on the advisory board of cryptocurrency giant, Binance. According to...

News

Joy Onuorah Automobile company, Mercedes-Benz has recalled 161,000 SUV models due to a hazardous fault in the construction of its window trim bars. Models...

News

A leading Pan-African communications consultancy and press release distribution service, APO media group, said it’s giving qualified journalists an all-expense paid trip to the...

News

Microsoft Inc. has begun the release of its first major update to the current version of its Personal Computers operating system, Windows 11. According...

Advertisement