FBI: Watch out for LockBit 2.0 ransomware, here's how to reduce the risk to your network

The Federal Bureau of Investigations (FBI) has published a fresh warning about LockBit 2.0. recommending that companies enable multi-factor authentication (MFA) and use strong, unique passwords for all admin and high-value accounts to thwart the strain of ransomware that is used by one of the busiest attack groups on the internet today.

MFA is vital to protecting against compromised user and admin passwords, but Microsoft has found that 78% of organizations using Azure Active Directory don’t enable MFA.  

ZDNet Recommends

LockBit 2.0 targets Windows PCs and now Linux servers too via bugs in VMWare’s ESXi virtual machines, and has hit tech consulting and services giant Accenture and France’s Ministry of Justice among others.

SEE: Cybersecurity: Let’s get tactical (ZDNet special report)

LockBit’s operators use any method available to compromise a network, as long as it works. These include, but are not limited to, buying access to an already compromised network from “access brokers“, exploiting unpatched software bugs, and even paying for insider access, as well as using exploits for previously unknown zero-day flaws, according to the FBI’s report

The group’s techniques continue to evolve. The FBI says LockBit’s operators have started advertising for insiders at a target company to

Read More: https://www.zdnet.com/article/fbi-watch-out-for-lockbit-2-0-ransomware-heres-how-to-reduce-the-risk-to-your-network/#ftag=RSSbaffb68