The rapid wave of cyber attacks, the number of which is growing all over the world, has not bypassed Belarus either.
Traces of a new virus that attacks Europe, the US and Asia have been found in Belarusian computer networks. As noted in the department "K", representatives of some large Belarusian companies have already applied to the police with statements. The purpose of fraudsters is to block valuable information, primarily viruses (for example, "Petya") threaten financial and accounting departments. Infected files are sent under the guise of resumes, financial reports, other incoming documentation, or disguised as an archive of documents. In fact, the virus is an EXE file, after launching which it is impossible to boot the operating system.
– The Petya encryption virus is new not only for Belarusian law enforcement officers, but also for the whole world. It is being studied by specialists, and some anti-virus programs recognize malicious files, - said the head of the department for solving crimes in the field of high technologies of the Ministry of Internal Affairs, police colonel Vadim Ustinovich. - Since the collection of data, their analysis and measures to identify the developers take time, we strongly recommend that citizens do not take any action, and if a ransom demand for decryption appears on a computer monitor, contact the police.
The victims were both individuals and legal entities who, after downloading infected files, received a notification about the blocking of the operating system and a requirement to pay money. The principle of operation of the prototypes of the Petya virus was based on scanning an open RDP port, then by guessing passwords, hackers gained access to the computer and sent a ransom demand.
To avoid becoming a victim of cyber attacks, you should use strong passwords, use only licensed software and antivirus software, and keep them up to date. Being vigilant when receiving e-mail messages from unfamiliar and suspicious sources will also help you avoid infecting your computer and network.
Предлагаем посмотреть другие страницы сайта:
← How Baranovichi SIZO No 6 works | Secretly conducted bacterial analysis of wipes from icons →