top of page

24 April 2023

Translocated Cheetah Died 

 

News: One cheetah translocated to Madhya Pradesh’s Kuno National Park (KNP) from South Africa died on Sunday,

 

About news:

  • A cheetah named Uday died at the age of 6 in Kuno National Park

  • This is the second such incident at KNP in almost a month as earlier, Namibian cheetah Sasha died due to a kidney ailment.

 

Translocation of Cheetah

  • Twelve cheetahs were translocated in Madhya Pradesh from South Africa in February 2023.

  • They were released into the quarantine enclosures at the Kuno National Park (KNP) in the Sheopur district,

  • Earlier the first batch of eight Cheetahs was brought there from Namibia, another African nation.

Read more on Cheetah Translocation


 

LockBit Ransomware

News:  LockBit ransomware was found to be targeting Mac devices. 

 

About LockBit Ransomware

  • The LockBit ransomware is designed to infiltrate victims’ systems and encrypt important files. 

  • The virus is categorised as a “cryptovirus” due to its requests for payment in cryptocurrency to decrypt files on the victim’s device. 

  • LockBit ransomware has been used to target enterprises and organisations in the U.S., China, India, Ukraine, and Indonesia. Attacks have also been recorded throughout Europe, including France, Germany, and the U.K.

 

Working on LockBit Ransomware

  • It works as a self-spreading malware and does not require additional instructions once it has successfully infiltrated a single device with access to an organisational intranet. 

  • It is also known to hide executable encryption files by disguising them in the .png format, thereby avoiding detection by system defences. 

  • Attackers use phishing tactics and other social engineering methods to impersonate trusted personnel or authorities to lure victims into sharing credentials. 

  • Sometimes, the ransomware has also used brute force to gain access to the intranet server and network of an organisation.

  • Once it has gained access, the ransomware prepares the system to release its encryption payload across as many devices as possible.

  •  It then disables security programs and other infrastructures that could permit system data recovery. 

  • The goal is to ensure that data recovery without assistance from the LockBit gang is impossible.

 

Way to prevent:

  • The use of strong passwords, with strong variations of special characters which are not easy to guess along with multi-factor authentication should be implemented

bottom of page