Categories: Tech

Govt issues red alert as ransomware hits computers via email

<p>
The Central government has issued a ‘Virus Alert’ via The Indian Computer Emergency Response Team (CERT-In) as a new type of ransomware has been found spreading through email.</p>
<p>
The ransomware is targeting Windows computers and once the payload is delivered it locks the PC remotely and asks for money from the user to open it again.</p>
<p>
CERT-In in its latest advisory warned about the ransomware called Diavol. According to the advisory, the ransomware is compiled with Microsoft Visual C/C++ Compiler. “It is encrypting files using user-mode Asynchronous Procedure Calls (APCs) with an asymmetric encryption algorithm,” it said.</p>
<p>
According to CERT-In, the Diavol malware has been spreading via email, which includes a link to OneDrive. The OneDrive link directs the user to download a zipped file which includes an ISO file containing a LNK file and a DLL. Once opened on the users system, the LNK file masqueraded as a Document entices the user to click/open it. Once the user executes the LNK file, the malware infection will be initiated.</p>
<p>
<strong>Diavol damage</strong></p>
<p>
After the Diavol malware infects a PC, it carries out pre-processing on the victim system including registering the victim device with a remote server, terminating running processes, finding local drives and files in the system to encrypt, and preventing recovery by deleting shadow copies. Then, the files are locked and desktop wallpaper is changed with a ransom message.</p>
<p>
When executing on a compromised machine, the ransomware extracts the code from the images’ PE resource section and loads it within a buffer with execution permissions, according to CERT-In</p>
<p>
<strong>How to stay safe from Diavol</strong></p>
<p>
In order to stay safe from this ransomware it is crucial that users update software and operating systems with the latest patches. Scan all incoming and outgoing emails to detect threats and filter executable files from reaching end users.</p>
<p>
Other methods include, network segmentation and segregation into security zones – help protect sensitive information and critical services. Separate administrative network from business processes with physical controls and Virtual Local Area Networks.</p>

IN Bureau

Recent Posts

“Results and how you act are important,” CDS Gen Anil Chauhan clarifies position on losses during Op Sindoor

Chief of Defence Staff (CDS) General Anil Chauhan delivered a special lecture on 'Future Wars…

6 minutes ago

Indian companies post satisfactory Q4 results despite global challenges: Bank of Baroda Report

Corporate performance of Indian companies in the fourth quarter of financial year 2025 remained satisfactory…

3 hours ago

China ramps up military pressure on Taiwan with 70 warships, 75 jets in may amid invasion threat

Beijing sent two aircraft carrier strike groups and numerous warships to the waters both north…

4 hours ago

PM Modi speaks to Assam, Sikkim CMs and Manipur Governor over flood situation, assures full support

Prime Minister Narendra Modi on Tuesday spoke to Assam Chief Minister Himanta Biswa Sarma, Sikkim…

5 hours ago

With Japan in the rearview, Indian envoy to US Vinay Kwatra says nation eyes $30 trillion economy by 2047

India's Ambassador to the US, Vinay Mohan Kwatra, highlighted the country's economic growth trajectory and…

6 hours ago

PV Sindhu, Lakshya Sen to lead India’s challenge at Indonesia Open 2025

Ace shuttlers PV Sindhu and Lakshya Sen will spearhead India's challenge along with doubles duo…

7 hours ago