content-left-bg.png
content-right-bg.png

Cyber Security

 
WebPartZone1_1
PublishingPageContent

​​

The information below is for your information only. Always​​ be alert and safe.

Ransomware alert​

The Queensland Department of Education has been made aware of a ransomware variant called Royal.

What is ransomware?

Ransomware is a common and dangerous type of malware. It works by locking up or encrypting your files so you can no longer access them. A ransom (money) is demanded to return access to the sensitive files. Cybercriminals might also demand a ransom to prevent data and intellectual property from being published or sold online. 

Royal ransomware key points:

Royal ransomware has been successfully used by cybercriminals to compromise at least 70 organisations worldwide and includes the targeting of Australian critical infrastructure, and notably an educational institution.

  • It restricts access to corporate files and systems by encrypting them into a locked and unusable format. Victims receive instructions on how to engage with the threat actors after encryption.
  • This ransomware implements a 'double extortion' technique by uploading samples of stolen victim data obtained through the attack and threatening to sell and/or release additional information if their ransom demands are not met.
  • A range of vectors are used to gain initial access into victim networks.

Remain vigilant for suspicious communication attempts and think carefully before you click on a link, open an unexpected attachment or download software.

Royal ransomware tactics being used:

Cybercriminals deploying Royal ransomware use a range of techniques including phishing, social engineering and exploitation of unpatched vulnerabilities.

Confirmed tactics include:

  • Callback phishing – where victims are tricked into taking action, such as returning a phone call or opening an email attachment. When victims call the number from the phishing message, they are persuaded to install malicious remote access software
  • Making malicious downloads appear authentic on legitimate software download sites
  • Using Google Ads in a campaign to blend in with normal ads
  • Using contact information located on an organisation's website to distribute phishing links
  • Exploiting known vulnerabilities or common security misconfigurations

 Report any suspicious communication immediately

If you receive any suspicious or unsolicited communication with links or attachments, whether that is from trusted or unknown sources.

WebPartZone1_2
WebPartZone2_1
WebPartZone2_2
WebPartZone2_3
WebPartZone3_1
WebPartZone3_2
WebPartZone3_3
WebPartZone3_4
WebPartZone4_1
WebPartZone5_1
WebPartZone5_2
WebPartZone6_1
WebPartZone6_2
WebPartZone7_1
WebPartZone7_2
WebPartZone8_1
WebPartZone8_2
WebPartZone9_1
Back to news feed
Last reviewed 31 January 2023
Last updated 31 January 2023