Ransomware targets home users – with some advice for you – UPDATED

This post was first made on 14 October 2022

Original Post

Threat actors do not care who they infect as long as they pay up. Now fake anti-virus and security updates for Windows 10 have been circulating and deploying Magniber ransomware – the zip files contain JavaScript that initiates the infection – to home users.

It is reported that victims have received demands for payment of up to $2,500 for a decryption tool to recover their files.

Magniber ransomware now infects Windows users via JavaScript files (bleepingcomputer.com)

Even home users need a ransomware resilient backup. We provide that for many of our clients as well as one for their businesses.

Update 20 October 2022

Here is some more up to date information on this issue from the HP Wolf Security Blog:

Magniber Ransomware Adopts JavaScript, Targeting Home Users with Fake Software Updates | HP Wolf Security

This malicious campaign emphasises that anyone who uses a computer and store any personal information on it – both official, banking details, scans of important documents etc. or personal information, family photos and videos etc. – needs to take similar cyber security steps as a business. To include at the least:

  • A good anti-virus/anti-malware package
  • A ransomware resilient back-up
  • A commitment to keep software patched and up to date

Clive Catton MSc (Cyber Security) – by-line and other articles