FBI warns the computer pirates who travel over time
Cybercriminals always find new ways of cheating it, either imitating a government agency, creating a false website or delivering malware disguised as a software update. Just when you think you’ve seen everything, they come up with a new trick.
This time, the FBI has issued an alert: computer pirates are using a “time travel” technique to avoid the safety measures of their device. No, we are not talking about real -time trips (although something would be that?). This is a sophisticated cyber attack where computer pirates manipulate the internal clock of a system to sneak out of security defenses.
Usa to the “Cyberguy Free Report: Obtain my expert technical advice, critical security alerts and exclusive offers, in addition to instant access to my free “Survival guide for definitive scam “ When you register.

A man who works on his laptops (Kurt “Cyberguy” Knutsson)
What you need to know
The concept of “computer pirates who travel over time” refers not to literal time trips, but to a sophisticated cyber attack technique where computer pirates manipulate the internal clock of a system to avoid security measures. According to reports, this attack is linked to the Medusa Ransomware gang.
In this type of attack, hackers exploit the expired security certificates by altering the system date on a device aimed at a time when these certificates were still valid. For example, a security certificate that expired, for example, 2020 could be used again if the system clock is delayed in 2019. This allows malicious software signed with these obsolete certificates to be recognized as legitimate by the system, effectively “travel in time” from a security perspective.
This technique was significantly used in Medusa Ransomware attacks, which went to critical infrastructure and caused a FBI cybersecurity notice (AA25-071A) before in 2025. The campaign has affected more than 300 critical infrastructure objectives. The attackers combined this method with social engineering and exploded vulnerabilities without blinking, amplifying the threat.
The FBI warned that such attacks represent a significant risk, since they can disable modern security protections such as Windows defending when they deceive the system to accept obsolete conductors or software.

A woman who works on her laptop and moving on her phone (Kurt “Cyberguy” Knutsson)
Doublecickjacking Hack double click on account acquisitions
What does the FBI recommend?
Traditional search and rescue tools, such as rigid robots and specialized cameras, often fight in disaster areas. The cameras only follow straight paths, which forces the teams to cut the debris just to see more inside. Rigid robots are vulnerable in adjusted and unstable spaces and expensive to repair when damaged. And manual survey is slow, exhausting and risks the safety of responders.

A man who works on his laptop (Kurt “Cyberguy” Knutsson)
Implacable computer pirates leave the windows to aim at their Apple ID
5 ways to stay safe from Medusa malware
1) Use strong antivirus software: A strong antivirus is no longer just to catch old school virus. You can detect phishing links, block malicious downloads and stop the ransomware before you put a support point. Since the Medusa gang uses false updates and social engineering to deceive users, having a strong antivirus software adds a critical layer of protection against threats that may not see coming. Get my elections from the best antivirus protection winners 2025 for your Windows, Mac, Android and iOS devices.
2) Enable two factors authentication (2FA): The FBI specifically recommends enable 2FA in all servicesespecially for high value objectives such as web email, VPN accounts and remote access tools. 2FA makes it significantly more difficult for attackers to enter, even if they have managed to steal their username and password through phishing or other tactics.
3) Use strong and unique passwords: Many ransomware groups, including Medusa, trust reused or weak passwords to get access. The use of a safe password (think of long, random and unique for each account) largely reduces that risk. A password administrator can help you generate and store complex passwords so you don’t have to remember them all yourself. Get more details about me The best password administrators reviewed by experts of 2025 here.
4) Monitor suspicious time changes in the system: The nucleus of this “trip in time” attack is the handling of the clock: the hackers backed the clock from a device at a time when the expired security certificates were still valid. This allows obsolete and potentially malicious software to seem reliable. Be alert to unexpected changes in the system time, and if you manage an organization, use tools that mark and record this type of configuration changes.
5) Keep updated systems and patch known vulnerabilities: The Medusa Ransomware campaign has a history of exploitation of unnaned systems. That means that old software, obsolete controllers and ignored security updates can become entry points. Regularly Installation of updates for your operating system, applications and controllers It is one of the most effective ways of staying protected. Do not postpone those system notifications; They exist for a reason.
Clickfix malware deceives him to infect his own PC with Windows
Kurt key takeway
The jellyfish attack is a good example of how cybercriminals are changing tactics. Instead of trusting traditional methods such as brute force or obvious exploits, they are aimed at the basic logic on which the functioning systems depend. In this case, it is something as simple as the system clock. This type of strategy defies the way we think about security. It is not just about building stronger defenses, but also to question the predetermined assumptions integrated in the technology we use every day.
How do you think technology companies can better support individual users to protect their data and devices? Get us knowing in Cyberguy.com/contact.
To obtain more technological tips and safety alerts, subscribe to my free Cyberguy Report newsletter when you head Cyberguy.com/newsletter.
Ask Kurt a question or let us know what stories we would like to cover.
Follow Kurt in his social channels:
- YouTube
Answers to the most informed Cyberguys questions:
- What is the best way to protect your MAC devices, Windows, iPhone and Android to be pirate?
- What is the best way to stay private, safe and anonymous while navigating the web?
- How can I get rid of robocalls with data elimination applications and services?
- How do I eliminate my private internet data?
New Kurt:
- Try the new Cyberguy games (crosswords, words searches, trivia and more!)
- Cyberguy exclusive coupons and offers
- The best gifts for mom 2025
Copyright 2025 Cyberguy.com. All rights reserved.
Kurt “Cyberguy” Knutsson is a award -winning technological journalist who has a deep love for technology, equipment and devices that improve life with their contributions for News & News Business Startzing Mornings in “News & Friends”. Do you have a technological question? Get the free Kurt’s free newsletter, share your voice, an idea of the story or comment on Cyberguy.com.


