Threat actors have leveraged fake Windows 10 updates to launch a massive Magniber ransomware campaign that began this month, reports BleepingComputer.
Users around the world have reported being impacted by the Magniber ransomware through phony Windows 10 updates, with Security_Upgrade_Software_Win10.0.msi and Security_Upgrade_Software_Win10.0.msi being the most prevalent.
Submissions to VirusTotal indicate that the campaign had begun on April 8, with the fake updates likely distributed through crack sites and fake warez. Shadow volume copies are initially deleted by the Magniber ransomware before proceeding to file encryption, which will then lead to the inclusion of a random 8-character extension.
Ransom notes have also been created by Magniber, which has mostly demanded payments of around $2,500 or 0.068 bitcoins. Magniber's My Decryptor payment site has also been found to allow free decryption of a single file.
Moreover, consumers and students have been the key targets of the campaign, rather than enterprises, BleepingComputer found.
New attacks with the updated SysUpdate toolkit have been deployed by Chinese advanced persistent threat operation Budworm, also known as APT27, Emissary Panda, Bronze Union, Lucky Mouse, Iron Tiger, and Red Phoenix, against an Asian government and a Middle East-based telecommunications provider, reports The Hacker News.
Forty-five malicious NPM and PyPI packages have been deployed by threat actors to facilitate extensive data theft operations as part of a campaign that commenced on Sept. 12, according to BleepingComputer.
Sixty thousand emails from U.S. State Department accounts were noted by a staffer working for Sen. Eric Schmitt, R-Mo., to have been exfiltrated by Chinese threat actors during the widespread compromise of Microsoft email accounts that commenced in May, according to Reuters.