Close Menu
  • Homepage
  • Local News
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
  • Business
  • Technology
  • Health
  • Lifestyle
Facebook X (Twitter) Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
Facebook X (Twitter) Instagram Pinterest
JHB NewsJHB News
  • Local
  • India
  • World
  • Politics
  • Sports
  • Finance
  • Entertainment
Let’s Fight Corruption
JHB NewsJHB News
Home»Technology»The ransomware that doesn’t need internet: Why Mamona is a threat you shouldn’t ignore | Technology News
Technology

The ransomware that doesn’t need internet: Why Mamona is a threat you shouldn’t ignore | Technology News

July 18, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Unlike traditional ransomware that relies on remote command-and-control servers, Mamona functions entirely offline. (Image: FreePik)
Share
Facebook Twitter LinkedIn Pinterest Email

A brand new cyber menace is on the horizon — one which operates with out an web connection. Safety researchers have recognized Mamona ransomware, a stealthy malware that executes offline, encrypts information utilizing regionally generated keys, and erases its tracks, making detection extraordinarily troublesome.

In contrast to conventional ransomware that depends on distant command-and-control servers, Mamona capabilities solely offline by abusing the Home windows ping command.

“Mamona generates encryption keys regionally, making it efficient even in air-gapped or remoted methods, difficult the idea that offline environments are inherently safe,” stated Neehar Pathare, MD of 63SATS Cybertech. “This strategy permits attackers to bypass normal community surveillance methods, making detection troublesome.”

Story continues under this advert

Cybersecurity professional Shubham Singh stated, “The whole lot Mamona must lock your information is constructed into the malware itself. As soon as executed, it begins encrypting knowledge autonomously, without having to contact any server or hacker.”

How does Mamona unfold?

In line with Singh, Mamona spreads by means of bodily media like Common Serial Bus (USB) drives or exterior arduous disks. An infection happens when a consumer unknowingly plugs in a compromised gadget, triggering the ransomware.

“It usually makes use of hidden information, autorun scripts, or obfuscation to bypass antivirus software program. Even air-gapped methods are in danger as a result of Mamona leverages human interplay with bodily gadgets to realize entry,” Singh defined.

Pathare stated, “The stealthy nature of such threats makes it important for organisations to implement strict gadget insurance policies, preserve constant offline backups, and prepare customers in managing bodily media responsibly. {Hardware}-based allow-listing and robust endpoint monitoring are additionally vital in defending remoted methods.”

Story continues under this advert

As soon as the ransomware is activated, it generates encryption keys regionally and shows a ransom word on the display or as a file, instructing the sufferer to make use of one other gadget – a smartphone or one other laptop – to contact the attacker. “In some instances, the ransom demand might embrace scanning a QR code or sending an e mail for additional directions,” stated Singh.

Why Mamona is difficult to detect

  • Lack of web connectivity prevents conventional safety instruments from monitoring or blocking the menace in actual time.
  • Offline methods usually run outdated software program, making them extra susceptible.
  • Customers might not instantly recognise indicators of an assault, delaying response.
  • USB ports are steadily unsecured, offering a straightforward entry level.
  • As soon as executed, the malware is difficult to isolate and take away.

Methods to keep secure

Singh recommended a number of sensible steps to remain secure from Mamona and related threats.

Keep away from unknown USBs: By no means plug in drives from unverified or unfamiliar sources.

Use offline-capable antivirus instruments: Guarantee your endpoint safety can detect threats with out counting on cloud-based methods

Story continues under this advert

Preserve all software program up to date: Even disconnected methods ought to obtain common firmware and patch updates.

Again up knowledge securely: Retailer backups in offline or read-only codecs to permit restoration after an assault.

Look ahead to warning indicators: Renamed information, inaccessible paperwork, or unusual messages might point out ransomware.
Practice all customers: Be certain that employees are conscious of the dangers of bodily media and know methods to report suspicious exercise.

The Secure Aspect:

Because the world evolves, the digital panorama does too, bringing new alternatives—and new dangers. Scammers have gotten extra subtle, exploiting vulnerabilities to their benefit. In our particular characteristic sequence, we delve into the most recent cybercrime traits and supply sensible ideas that can assist you keep knowledgeable, safe, and vigilant on-line.



Source link

doesnt ignore Internet Mamona news ransomware shouldnt Technology Threat
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Faf du Plessis: Rishabh Pant ‘under most pressure’ ahead of second IPL season as LSG captain | Cricket News

March 13, 2026

More than 20% of Australian teens still on social media after ban, report finds | Technology News

March 13, 2026

Google Play Games Gets Game Trials and AI Tips

March 13, 2026

OnePlus Pad 4 Specs and Release Date Leak

March 13, 2026
Add A Comment
Leave A Reply Cancel Reply

Editors Picks

Royal Honors Slammed As King Charles Strips Titles

March 13, 2026

Best high-yield savings interest rates today, March 12, 2026 (top account pays 4% APY)

March 13, 2026

Faf du Plessis: Rishabh Pant ‘under most pressure’ ahead of second IPL season as LSG captain | Cricket News

March 13, 2026

Harry Enten Spots A Brutal New Milestone For Trump

March 13, 2026
Popular Post

‘Where will Shah Rukh stand’: Shilpa Shirodkar recalls being dropped from ‘Chaiyya Chaiyya’ song for her weight; why such rejections leave lasting scars | Lifestyle News

Mark Yusko Exposes Crypto Reality

Hurricane Melissa could be strongest to ever hit Jamaica

Subscribe to Updates

Get the latest news from JHB News about Bangalore, Worlds, Entertainment and more.

JHB News
Facebook X (Twitter) Instagram Pinterest
  • Contact
  • Privacy Policy
  • Terms & Conditions
  • DMCA
© 2026 Jhb.news - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.