Ragnar Locker Ransomware

The Ragnar Locker ransomware gang is adopting a new technique where they are forcing the victim to pay the ransom, where the operators are threatening to leak the stolen data.

After this, the group has come up with a solution where they have introduced a new strategy where they will request help from the data recovery expert and the professional negotiators.

As per the report, In this profession, they are getting many numbers of professional negotiators where it is not becoming an easier process and safe.

These types of negotiators are mainly working for the company’s recovery where they are working directly with Police, investigation agencies, or the FBI. They are not interested in commercial success; they want their client’s safety and private data.

Notice
They also warn their clients that whenever they hire the recovery company for the negotiation, they will send the request to the FBI or investigators office. That time only this application they will consider and stat working on that but sometimes without any request, they will also work because they recognize the lie and they do work on emergency. 

They want to convey to all of their clients that the client can take their help to resolve things smoothly. This type of ransomware operator is very professional, and they are not interested in any commercial success.

In the past, the Ragnar Locker gang has hit high-profile organizations like Dassault Falcon, Japanese gaming form Capcom, chipmaker ADATA, etc.

In November April 2020, they issued a flash alert to warn the private industry partner that they have increased the Ragnar Locker ransomware activity.

As per the report, here are the technical details of the ransomware that mitigate the threat:

  1. They recommend the mitigation and keep the data back up offline.
  2. They also make sure that every copy of critical data have be store in the external drive.  Everyone should not have access of it.
  3. Everyone uses the secure network by installing VPN.
  4. Make sure anti-virus and anti-malware solutions are set to automatically update and run regular scans.
  5. Secure your backups. Make sure they are not connected to the computers and networks they are backing up.
  6. Make sure anti-virus and anti-malware solutions are set to automatically update and run regular scans.

Follow us on LinkedinTwitterFacebook for daily Cybersecurity News & Updates

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.