earlier this month to unlock the network . The state legislators ' offices continue to operate via a combination of cell phones and laptops , some personal and some provided by the caucus . In the last two weeks , email service was also restored . On Monday , Senate Minority Leader Jay Costa said Microsoft technicians would begin going around to strip down and rebuild every computer with the goal of having everything restored in the next several days . `` [ They are ] working to rebuild our network so we 're all operating off one system , '' the Allegheny County Democrat said . `` We 're rebooting that very soon . '' Costa said he can not comment on the ongoing investigation or the exact dollar amount demandedAttack.Ransomby the hackers . The caucus has not and will not pay the ransomAttack.Ransom, he said . `` For people who do pay the ransomAttack.Ransom, the likelihood they 'll get the codes they need to undo the encryption is much lower than people talk about , '' he said . `` And there are a number of times it 's happened you do n't hear about . '' Hackers who launch such attacks lock their targets out of their data in an effort to extract a ransomAttack.Ransomfor its return . The security firm SonicWall estimated 638 million ransomware attacksAttack.Ransomthat cost $ 209 million last year , more than 167 times the 3.8 million attacksAttack.Ransomrecorded in 2015 .
The IT security researchers at Trend Micro recently discovered malware that has the potential to infect Linux-based servers . The malware , called Erebus , has been responsible for hijacking 153 Linux-based networks of a South Korean web-hosting company called NAYANA . Erebus is a ransomware capable of infecting Linux operating systems . As such , around 3,400 of NAYANA ’ s clients were affected due to the attack with databases , websites and other files being encrypted . The incident took place on 10th June . As of now , NAYANA has not received the keys to decrypt their files despite having paidAttack.Ransomthree parts of the ransomAttack.Ransom. The fourth one , which is allegedly the last installment , is yet to be paid . However , according to NAYANA , the attackers claimed to provide the key after three paymentsAttack.Ransom. According to Trend Micro ’ s report , Erebus was originally found back in September 2016 . At the time , the malware was not that harmful and was being distributed through malware-containing advertisements . Once the user clicked on those ads , the ransomware would activate in the usual way . The initial version of the Erebus only affected 423 file types and did so using the RSA-2048 encryption algorithm , thereby encrypting the files with the .encrypt extension . Furthermore , it was this variant that was using a number of websites in South Korea as a command- & -control ( C & C ) center . Later , in February 2017 , the malware had seemingly evolved as now it had the ability to bypass User Account Control ( UAC ) . For those who may be unfamiliar with UAC , it is primarily a Windows privacy protection system that restricts anyone who is not authorized , to alter the user ’ s computer . However , this later version of the Erebus was able to do so and inject ransomware ever so conveniently . The campaign in which this version was involved demanded a ransomAttack.Ransomof 0.085 bitcoins – equivalent to USD 216 at present – and threatened to delete the files in 96 hours if the ransomAttack.Ransomwas not paidAttack.Ransom. Now , however , Erebus has reached new heights by having the ability to bypass not only UAC but also affect entire networks that run on Linux . Given that most organizations today use Linux for their networks , it is no surprise to see that the effects of the malware are far-reaching . According to Trend Micro , the most recent version of Erebus uses RSA algorithm to alter the AES keys in Windows and change the encryption key as such . Also , the attack is accompanied by a Bluetooth service so as to ensure that the ransomware does not break , even after the computer is rebooted . This version can affect a total of 433 file types including databases , archives , office documents , email files , web-based files and multimedia files . The ransom demandedAttack.Ransomin this campaign amounts to 5 bitcoins , which is USD 12,344 currently . Although ransomware affecting Linux based networks are rare , they are , however , not new . Erebus is not the first ransomware to have affected networks running on Linux . In fact , Trend Micro claims that such ransomware was discovered as far back as in 2014 . Some of the ransomware include Linux.Encoder , Encrypter RaaS , KillDisk , KimcilWare and much more . All of these were allegedly developed from an open-source code project that was available as part of an educational campaign . The ransomware for Linux , despite being somewhat inferior to those for Windows , are still potent enough to cause damage on a massive scale . This is because , a number of organizations and data centers use Linux , and hijacking such high-end systems can only mean catastrophe . To avoid any accidents happening , IT officials and organizations running Linux-based networks need to take some serious precautions . The most obvious one is to simply keep the server updated with the latest firmware and anti-virus software . Furthermore , it is always a good idea to keep a back-up of your data files in two to three separate locations . It is also repeatedly advised to avoid installing unknown third-party programs as these can act as potential gateways for such ransomware . Lastly , IT administrators should keep monitoring the traffic that passes through the network and looks for anomalies by identifying any inconsistencies in event logs .
Cybercriminals that specialize in ransomware , which affects thousands of computers and mobile devices every year , are ramping up their attacks against businesses . It is here that they can get their hands on valuable information and large sums of cash . This particular kind of malware , which hijacks devices and demands a ransomAttack.Ransomfor their return , has managed to conquer another kind of technology : smart TVs . Last December , the American developer Darren Cauthon announced on Twitter that a family member ’ s television had fallen victim to one of these attacksAttack.Ransom. The television in question was an LG model that came out in 2014 that is compatible with Google TV , a version of Android tailored to televisions . Once it had infiltrated the device , the malicious software demanded a ransomAttack.Ransomof $ 500 dollars to unlock the screen , which simulated a warning from the Department of Justice . pic.twitter.com/kNz9T1kA0p — Darren Cauthon ( @ darrencauthon ) December 25 , 2016 The appearance of the false message would lead you to believe that it ’ s a version of the ransomware known as Cyber.police , also known as FLocker . Ordinarily this ransomware affects smartphones with Google ’ s operating system . After hijacking the device , the malware collectsAttack.Databreachinformation from the user and the system , including contact information and the location of the device , to be sent encrypted to cybercriminals .