iSheriff is investigating a new form of Ransomware that goes by the name KEYHolder. KEYHolder appears to be from the same folks that were behind Cryptorbit. Like other Ransomware, KEYHolder will encrypt files (documents, music, videos, images etc.) on attached drives, including network mapped file shares. Once the encryption is complete, a ransom of $500 is demanded for the unlock key. The user is directed to download a Tor compliant browser and make the ransom payment through a Tor masked server.
Cloud Security Enables a Secure Foundation for the Internet of Things
When we think of the internet, we typically think of a diverse network enabling users to access information and applications from personal computing devices. However, we are now seeing an explosion in the volume of machine-to-machine interactions occurring across the internet. Products from home appliances, to cars and industrial equipment are rapidly evolving into connected, smart, network-enabled systems that interact with users, with each other, and with other connected services to vastly expand their functionality. This world of internet-connected devices is often referred to as the Internet of Things (IoT).