Ransomware actors target VoIP service with another wave of DDoS attacks

A series of sustained Distributed Denial of Service ( DDoS ) reportedly knocked UK Voice over Internet Protocol ( VoIP ) provider VoIP Unli...

A series of sustained Distributed Denial of Service (DDoS) reportedly knocked UK Voice over Internet Protocol (VoIP) provider VoIP Unlimited offline, weeks after it was targeted in a REvil-orchestrated ransomware campaign.

According to The Register, last week’s downtime was the result of "an alarmingly large and sophisticated DDoS attack attached to a colossal ransom demand" which VoIP Unlimited has pinned to the REvil ransomware gang.

The attack is also blamed for disrupting the operations of other UK VoIP providers at the same time as well. 

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

As of 11 December however, VoIP Unlimited has restored a majority of its services, while a couple continue to report “Degraded Performance.”

From ransomware to DDoS

The Register notes that while REvil is notorious for its ransomware operations, it seems to have joined the list of ransomware operatives who have begun switching to conducting extortion-based DDoS campaigns.

In fact, it appears before attacking VoIP Unlimited, the gang honed their skills by going after a Canadian firm in mid-September, and demanding one bitcoin (around $45,000 at the time) to cease the attacks.

Commenting on the change in tactics of ransomware operators, cybersecurity analysts at TrendMicro observed that multilevel extortion schemes were beginning to emerge as the latest trend in the ransomware underworld.

“Triple extortion follows a straightforward formula: adding DDoS attacks to the aforementioned encryption and data exposure threats. These attacks could overwhelm a server or a network with traffic, which in turn could halt and further disrupt operations,” observed TrendMicro.

The new modus operandi was first performed by SunCrypt and RagnarLocker operators in the latter half of 2020, adding that the REvil operators were also looking to adopt this new ransomware strategy.

The emergence of ransomware DDoS (RDDoS) attacks was also recently highlighted in a report by US telecoms company Lumen Technologies, as it urged businesses to prepare for this incoming onslaught.

Via The Register

from TechRadar - All the latest technology news https://ift.tt/3mBYrZi



Apps,3855,Business,148,Camera,1154,Earn $$$,1,Gadgets,1739,Games,924,Innovations,1,Mobile,1695,Paid Promotions,3,Promotions,3,Technology,7934,Trailers,795,Travel,36,Trendly News,21868,Video,4,XIAOMI,12,
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: Ransomware actors target VoIP service with another wave of DDoS attacks
Ransomware actors target VoIP service with another wave of DDoS attacks
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy