ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Maktub Locker tends to spread through an email phishing scam from a seemingly legitimate email address. While normal phishing attacks might give themselves away with spelling errors or terrible grammar, the phishing attacks used by Maktub Locker are relatively clean, and will raise few red flags, even for security-minded users. The email claims that the receiver owes money to an organization that they may (or may not) be associated with, and that they’re receiving the email because the payment is overdue.

The email also informs users that there has been a hard copy of a statement being sent to the user’s address. Included is a link that supposedly leads to a digital copy of the invoice. If users click on the link, a download will trigger for the Maktub Locker ransomware. The malware will then proceed to encrypt files on the user’s PC until the ransom has been paid. The fact that the hackers obtain the physical addresses of victims is a major cause for concern; they probably lifted the addresses from some online database.

If the user doesn’t pay the ransom as soon as possible, the cost of the ransom increases. ZDNet, which reported the appearance of this ransomware, reached out to the company whose email address was used to send a phishing message. Of course, the business had no connection whatsoever to the hacking attack. It’s just another classic example of a ransomware ruining the lives of innocent users and damaging the reputations of local business owners.

Ransomware’s ongoing rampage proves that not even the average user can be considered safe from frustrating malware infections and hacking attacks. All it takes to let ransomware into an infrastructure is one simple mistake: downloading the wrong file, or clicking on the wrong hyperlink. Ransomware, in particular, is cruel for business owners, as it has the power to cut them off from important files and resources that are required for daily operations. You need to take measures immediately to ensure that you, too, don’t fall victim to ransomware.

Some types of ransomware are capable of spreading throughout an infrastructure, encrypting more than just one solitary workstation. In a worst-case scenario, your entire network can fall victim to ransomware, leaving you with no way of continuing operations, save for a desperate last-minute backup restoration. You could also pay the ransom, but we don’t recommend doing so. If the hacker doesn’t provide the decryption key, you’re left with a hole in your wallet and you won’t be any better off for it.

Since ransomware is extraordinarily difficult to remove in most cases, your best bet to protect your systems is by using security best practices and educating your team on how to identify and avoid threats. It’s recommended that you consider a Unified Threat Management (UTM) solution to maximize your infrastructure’s security. To learn more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup communications Smartphone Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 Managed Service IT Support Browser Apps Windows 10 Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Remote Work Data Management Saving Money Operating System Government Workplace Strategy Managed IT services Gadgets Networking Windows Artificial Intelligence Spam Server WiFi Bandwidth Mobile Device Management Blockchain Encryption Remote Business Technology App Virtualization Information Office 365 Budget Employee/Employer Relationship Apple History Gmail Information Technology Office Two-factor Authentication Analytics Access Control Data Security Wi-Fi Cybercrime BDR Conferencing Big Data Health Voice over Internet Protocol Remote Computing Vendor Save Money Hacker Patch Management Compliance Remote Monitoring Cost Management Employer-Employee Relationship Help Desk IT Management Hacking Training Document Management Data storage Hiring/Firing Mobile Office Outlook Applications Password Managed Services Vulnerabilities Money Customer Service Unified Threat Management Firewall BYOD Project Management Augmented Reality Computing Word Vendor Management Hard Drive IBM Search... Data loss Website Best Practice Retail Legal Alert User Remote Workers Laptop VPN Windows 7 Update Travel Free Resource Virtual Reality Social Engineering Windows 11 Chrome Cryptocurrency Black Market Monitoring How To Healthcare Social Sports Cleaning SaaS DDoS Paperless Office Robot Antivirus Mobile Computing Maintenance iPhone Education Cortana Marketing Content Filtering Running Cable Websites Mobility Router Meetings Storage Twitter Law Enforcement Google Maps End of Support The Internet of Things Scam YouTube Printer Data Breach Wireless Technology Notifications eWaste Unified Communications Processor Tech Terms Managed Services Provider Google Docs Virtual Private Network Bluetooth Downtime Managed IT Safety Digital Distributed Denial of Service Office Tips Private Cloud Current Events Memory Virtual Desktop Taxes Multi-factor Authentication Solutions Experience PowerPoint Administration Politics Integration Images 101 Saving Time Machine Learning Display Settings Physical Security Presentation Specifications Computers Bitcoin Disaster IT Consultant Solid State Drive Employees Telephone Avoiding Downtime Start Menu Lithium-ion battery Customer Relationship Management Co-Managed IT Drones Downloads Holidays Computer Care Chromebook Entertainment Excel Vulnerability Automobile Processors Cooperation Software as a Service Video Conferencing Data Protection How To Virtual Machines Microchip Computer Repair Flexibility Virtual Assistant Professional Services Hack HIPAA Identity Theft Television Telephony Keyboard Health IT Memes Employer Employee Relationship Equifax Net Neutrality Cabling Tactics Scalability Hard Drive Disposal Human Resources Hard Drives Financial Data Tablet intranet Username Administrator G Suite Text Messaging Proactive IT Bring Your Own Device Freedom of Information Smart Technology Mouse Wireless Risk Management VoIP Shortcut IT Tracking Business Owner Startup Environment Addiction email scam Google Apps Heating/Cooling Navigation Music Telework Social Networking Web Server Mobile Security Windows XP Microsoft 365 News SharePoint Smartwatch User Tip Communitications Digital Payment Legislation Evernote Procurement Worker Network Management FinTech Access Botnet Emails Rental Service Fake News Supply Chain Micrsooft CES Time Management Proxy Server IT Assessment Public Cloud Inbound Marketing Supply Chain Management Service Level Agreement Value Computing Infrastructure Flash Business Growth Audit Organization Spyware Management Cyber security Device security Telephone Systems File Sharing Wireless Headphones Microsoft Excel Workplace Staffing Smart Devices Redundancy IP Address Tech Remote Working Electronic Payment Going Green Business Cards Google Wallet AI Cache Error Trend Micro Banking Workers Messenger Transportation Scams Deep Learning Digital Security Cameras Unified Threat Management Bookmark Electronic Health Records Term Download Wasting Time Phone System Piracy Hosted Solution Printing eCommerce CCTV HTML Business Metrics Modem Nanotechnology Books Cables Recovery Videos Touchscreen Competition Browsers Surveillance Emergency Google Play Upload Managing Costs Computer Malfunction Software License Language Society LiFi Vendor Mangement Entrepreneur Social Network SSID Samsung Screen Reader Reading Employer/Employee Relationships Computer Accessories Point of Sale Monitors Documents Visible Light Communication Media Application Data Analysis Development Security Cameras Uninterrupted Power Supply Business Intelligence Trends Virtual Machine Webcam Mobile Technology Windows 8 Shortcuts Reviews Business Mangement Customer Resource management Optimization Devices Tablets Relocation Teamwork Tip of the week Displays Securty Advertising 2FA Fileless Malware Domains Data Storage Gamification Hypervisor Company Culture Work/Life Balance Tech Support Be Proactive Google Calendar Shopping Telephone System Supercomputer Regulations Medical IT Backup and Disaster Recovery SQL Server Paperless Virus Directions PCI DSS Content In Internet of Things Licensing Motion Sickness Desktop Workplace Strategies Network Congestion Comparison Gig Economy Google Drive Electronic Medical Records Humor Troubleshooting Accountants Hacks Internet Service Provider Database Reliable Computing Azure Writing Business Communications Public Speaking Knowledge Regulations Compliance Corporate Profile Managed IT Service Streaming Media

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?