Skip to main content
Published Mar 01, 2023 | Updated Jul 28, 2023

Ransom:Win32/Moneybird.A!dha

Detected by Microsoft Defender Antivirus

Aliases: No associated aliases

Summary

Microsoft Defender Antivirus protects and detects this threat.

This ransomware encrypts the data on your disk and can stop you from using your device or accessing your data. It encrypts files, renders them inaccessible, and demands payment for the decryption key.

For more information about ransomware, read this article:

Guidance for Individual users

Guidance for enterprise administrators and Microsoft 365 Defender customers

Ransomware more than often attacks enterprises than individuals. Following the below mitigation steps can help prevent ransomware attacks:

  • Keep backups so you can recover data affected by ransomware and destructive attacks. Use controlled folder access to prevent unauthorized applications from modifying protected files.
  • Harden internet-facing assets and ensure they have the latest security updates. Use  threat and vulnerability management to audit these assets regularly for vulnerabilities, misconfigurations, and suspicious activity.
  • Monitor for brute-force attempts. Check excessive failed authentication attempts (Windows security event ID 4625).
  • Turn on cloud-delivered protection and automatic sample submission on Microsoft Defender Antivirus. These capabilities use artificial intelligence and machine learning to quickly identify and stop new and unknown threats.
  • Turn on the following attack surface reduction rules to block or audit associated ransomware and human adversary activities. To assess the impact of these rules, deploy them in audit mode.
    • Block process creations originating from PsExec and WMI commands
    • Use advanced protection against ransomware
    • Block credential stealing from the Windows local security authority subsystem (lsass.exe)
  • Utilize the Microsoft Defender Firewall and your network firewall to prevent RPC and SMB communication among endpoints whenever possible. This limits lateral movement as well as other attack activities.
  • Turn on tamper protection features to prevent attackers from stopping security services.
  • Educate end users about protecting personal and business information in social media, filtering unsolicited communication, identifying lures in spear-phishing email and watering holes, and reporting of reconnaissance attempts and other suspicious activity.
Follow us