ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Maktub Locker Ransomware Knows Where You Live

b2ap3_thumbnail_ransomware_maktub_400.jpgRansomware is so common in the world of online threats that even the FBI has labeled it a massive threat to businesses of all kinds. Unlike other types of malware, ransomware has a unique return on investment that’s measurable and highly lucrative for hackers. A new variant of ransomware called Maktub Locker lures victims into a false sense of security by tailoring phishing emails to match their street address.

Maktub Locker tends to spread through an email phishing scam from a seemingly legitimate email address. While normal phishing attacks might give themselves away with spelling errors or terrible grammar, the phishing attacks used by Maktub Locker are relatively clean, and will raise few red flags, even for security-minded users. The email claims that the receiver owes money to an organization that they may (or may not) be associated with, and that they’re receiving the email because the payment is overdue.

The email also informs users that there has been a hard copy of a statement being sent to the user’s address. Included is a link that supposedly leads to a digital copy of the invoice. If users click on the link, a download will trigger for the Maktub Locker ransomware. The malware will then proceed to encrypt files on the user’s PC until the ransom has been paid. The fact that the hackers obtain the physical addresses of victims is a major cause for concern; they probably lifted the addresses from some online database.

If the user doesn’t pay the ransom as soon as possible, the cost of the ransom increases. ZDNet, which reported the appearance of this ransomware, reached out to the company whose email address was used to send a phishing message. Of course, the business had no connection whatsoever to the hacking attack. It’s just another classic example of a ransomware ruining the lives of innocent users and damaging the reputations of local business owners.

Ransomware’s ongoing rampage proves that not even the average user can be considered safe from frustrating malware infections and hacking attacks. All it takes to let ransomware into an infrastructure is one simple mistake: downloading the wrong file, or clicking on the wrong hyperlink. Ransomware, in particular, is cruel for business owners, as it has the power to cut them off from important files and resources that are required for daily operations. You need to take measures immediately to ensure that you, too, don’t fall victim to ransomware.

Some types of ransomware are capable of spreading throughout an infrastructure, encrypting more than just one solitary workstation. In a worst-case scenario, your entire network can fall victim to ransomware, leaving you with no way of continuing operations, save for a desperate last-minute backup restoration. You could also pay the ransom, but we don’t recommend doing so. If the hacker doesn’t provide the decryption key, you’re left with a hole in your wallet and you won’t be any better off for it.

Since ransomware is extraordinarily difficult to remove in most cases, your best bet to protect your systems is by using security best practices and educating your team on how to identify and avoid threats. It’s recommended that you consider a Unified Threat Management (UTM) solution to maximize your infrastructure’s security. To learn more, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Upgrade Small Business Smartphones Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Social Media VoIP Users Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Browser Windows 10 Apps Managed Service IT Support Miscellaneous Cloud Computing Outsourced IT Managed Service Provider Internet of Things Data Management Remote Work Saving Money Operating System Government Gadgets Artificial Intelligence Networking Managed IT services Windows Workplace Strategy Spam WiFi Mobile Device Management Blockchain Bandwidth Business Technology Encryption Remote Information App Virtualization Server Office 365 Budget Apple Information Technology History Gmail Employee/Employer Relationship Office Two-factor Authentication Data Security BDR Cybercrime Conferencing Health Big Data Analytics Access Control Wi-Fi Patch Management Voice over Internet Protocol Hacker Remote Monitoring Cost Management Compliance Employer-Employee Relationship IT Management Training Document Management Help Desk Hacking Save Money Vendor Remote Computing BYOD Mobile Office Money Computing Managed Services Vendor Management Customer Service Project Management Hard Drive Unified Threat Management Firewall Data loss Augmented Reality Search... Word Best Practice Legal IBM Website Retail Alert Data storage Applications Hiring/Firing Outlook Password Vulnerabilities Monitoring Cleaning Chrome Remote Workers Healthcare Robot Paperless Office Antivirus Windows 11 Windows 7 Maintenance Free Resource Social Mobile Computing Sports SaaS DDoS How To Marketing Websites Twitter Running Cable iPhone Meetings Education Cortana Mobility Law Enforcement End of Support Content Filtering Storage Printer Google Maps Scam Router Data Breach VPN The Internet of Things YouTube User Travel Virtual Reality Update Social Engineering Cryptocurrency Black Market Laptop Multi-factor Authentication Taxes Politics Downtime Settings Safety Machine Learning Managed Services Provider Saving Time PowerPoint Solid State Drive Physical Security Virtual Desktop Administration Virtual Private Network Bitcoin Experience Computers Presentation Current Events Telephone Specifications Chromebook Drones IT Consultant Start Menu Solutions Automobile Computer Care Downloads Excel Customer Relationship Management Disaster Images 101 Vulnerability Co-Managed IT Integration Display How To Entertainment Software as a Service Microchip Lithium-ion battery Data Protection Flexibility Employees Virtual Assistant Avoiding Downtime Hack Identity Theft Processors Holidays Notifications Unified Communications HIPAA Cooperation Processor Google Docs Bluetooth Tech Terms Video Conferencing Distributed Denial of Service Managed IT Virtual Machines Office Tips Memory Computer Repair Digital Private Cloud Wireless Technology eWaste Professional Services Flash Business Communications intranet Internet Service Provider Access Azure Time Management Managed IT Service Public Cloud Telephone Systems Proxy Server Wireless Business Growth Smart Technology Emails Shortcut Regulations Compliance Fake News Heating/Cooling Computing Infrastructure Environment Memes Service Level Agreement Windows XP Management Human Resources Device security Audit Social Networking Inbound Marketing Net Neutrality Spyware File Sharing Banking Google Wallet Wireless Headphones Financial Data Microsoft Excel Going Green Risk Management Business Cards Redundancy IT Messenger Tech Deep Learning Error Google Apps Cache Telework Unified Threat Management Workers Business Metrics Bookmark Hosted Solution Supply Chain Electronic Payment Download Smartwatch Piracy Communitications Microsoft 365 Books Term CCTV Language Society HTML Printing Procurement FinTech Touchscreen Phone System Browsers Staffing Workplace Nanotechnology Monitors Upload IP Address Visible Light Communication CES Software License Emergency IT Assessment Reading Computer Malfunction Google Play Value Social Network Windows 8 Supply Chain Management Vendor Mangement Organization Cyber security Samsung Data Analysis Scams Screen Reader Displays Trends Advertising Mobile Technology Smart Devices Uninterrupted Power Supply Relocation Webcam Security Cameras Work/Life Balance Customer Resource management Tech Support Devices Remote Working Business Mangement Computer Accessories AI Tip of the week Trend Micro Tablets Fileless Malware Recovery Cables Competition Gamification Digital Security Cameras Company Culture Electronic Health Records Transportation Wasting Time In Internet of Things Supercomputer LiFi Telephone System Regulations Google Calendar Entrepreneur Virus eCommerce Modem Hacks Directions Documents Network Congestion Point of Sale Backup and Disaster Recovery Application Writing Content Videos Desktop Business Intelligence Surveillance Reliable Computing Motion Sickness Managing Costs Electronic Medical Records Shortcuts Accountants Comparison Google Drive SSID Securty Database Domains Media Knowledge Troubleshooting Development Corporate Profile Employer/Employee Relationships Scalability Virtual Machine Administrator Employer Employee Relationship Text Messaging Health IT Proactive IT Be Proactive Equifax Television Telephony Reviews Hard Drive Disposal Optimization Cabling Bring Your Own Device Tactics Username 2FA Tablet Teamwork G Suite Hypervisor Tracking Music Workplace Strategies Startup Mouse Data Storage Freedom of Information VoIP Public Speaking Shopping email scam Medical IT Navigation Addiction Streaming Media Paperless Mobile Security Business Owner SQL Server Web Server Licensing Botnet Digital Payment User Tip Legislation SharePoint Keyboard PCI DSS News Hard Drives Gig Economy Humor Worker Rental Service Evernote Micrsooft Network Management

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?