The National Cyber Emergency Response Team (National CERT) has issued a high-alert advisory to 39 ministries and critical institutions. The warning comes after intelligence reports confirmed the targeting of Pakistani entities by the BlueLocker ransomware.
The advisory has been sent to key offices, including the National Security Division, Establishment Division, Election Commission of Pakistan, and the National Assembly.
Other alerted bodies include the National Information Technology Board (NITB), PEMRA, NDMA, OGRA, and the Federal Board of Revenue (FBR).
According to the advisory, the BlueLocker ransomware poses an extremely severe threat. It is targeting Windows-based desktops, laptops, servers, networks, and cloud storage.
The malware spreads through trojanized downloads, phishing emails, unsecured file-sharing platforms, and hacked websites. Once active, it can lock files, demand ransom, disable antivirus software, spread across entire networks, and steal sensitive data.
Read More: Cyber Attack: 37.4TB DDoS hits single IP in 45 secs
CERT issues urgent cybersecurity guidelines
- National CERT has instructed all departments to:
- Strengthen computer and network defenses.
- Increase institutional vigilance.
- Avoid downloading files from unverified sources.
- Refrain from clicking on suspicious links or attachments.
- Maintain offline and secure data backups.
The advisory also recommends immediate employee training to recognize phishing emails, suspicious links, and other cyber threats.
How BlueLocker operates
BlueLocker uses aggressive encryption to block access to files. It then demands payment to restore data. In addition to encrypting systems, it attempts to disable security tools and move laterally within networks to access confidential information.