Data Security News Headlines 15th October, 2016

  1. Fifty Hyderabad IT firms hit by Pakistani hackers

HYDERABAD: At least 50 information technology companies have come under a wave of cyber-attacks from Pakistan-based hackers over the past 10 days, the Society for Cyberabad Security Council (SCSC) comprising Hyderabad’s top IT companies and police, said on Thursday. The Cyber Security Forum officials said Pakistani hackers have used servers in Turkey, Somalia and Saudi Arabia to launch attacks against companies. Explaining the method of attacks, officials said the proxy servers were changed every five minutes, but somehow the ethical hacker’s team managed to nail the location of the actual attackers through IP addresses, the port used and the network node.

Cyber Security Tips:  Now Pakistani hackers are targeting Indian sites and firms, to prevent from these hackers organizations need to improve their cyber security,also vulnerability assessment and penetration testing to find weaknesses.

  1. CryPy Ransomware Encrypts Each File Individually with a Special Key

New Ransomware CryPy Can Encrypt Each File Individually with a Special Key — The C&C of this ransomware is hosted on a hacked Israeli server. This ransomware has been written in Python. CryPy stands out is that it encrypts files on a system individually and that too, with a unique key for every file. This obviously makes data decryption very difficult. The team identified that CryPy has two main files namely and The first one error logs on Windows OS and the second one is the main locker. After the computer has been infected the Registry Tools are the first to be disabled by CryPy and then the focus is shifted to Task Manager, Run and CMD. Afterwards, boot status policy and recovery tools are disabled. When the disabling function has been performed successfully, the malware begins encrypting the files using a different encryption key for each file.

Cyber Security Tips: To prevent from ransomware attack keep backup of your data, use updated antivirus, avoid to use malicious websites, and avoid to click on spam mails.

Leave a Reply

Please log in using one of these methods to post your comment: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a free website or blog at

Up ↑

%d bloggers like this: