Federal agency issues alert on cybercriminals alleged to manipulate digital timeflow
Hack Alert! Difficult-to-detect cyberattacks costing billions
Hey there! Have you heard about the latest cyber threat that's giving tech experts nightmares? These cunning hackers have developed a new method, nicknamed "time-traveling," to bypass your device's security defenses. No, they're not sending you back to the Stone Age, but this sophisticated cyberattack manages to bypass your antivirus and other protections by messing with your device's internal clock.
Now, don't worry, we're not talking about actual time travel (now wouldn't that be sweet?). Instead, these hackers manipulate a system's internal clock to sneak past security defenses. You might be thinking, "Well, my clock's running fine, so I'm good!" right? Unfortunately, that's not always the case.
The Federal Bureau of Investigation (FBI) has issued a warning, saying that this "time-traveling hacker" technique is becoming increasingly popular, especially among ransomware gangs like Medusa. In this type of attack, these cyber villains exploit expired security certificates by adjusting the system date on a targeted device to a time when those certificates were still valid. Think about it—a security certificate that expired in 2020 could be made usable again if the system’s clock is set back to 2019. With that outdated certificate in tow, malicious software designed way back when can fool your system into thinking it's harmless. It's like loud, neon-colored spam disguised as a gourmet meal.
Want some clever tips to stay one step ahead of these devious hackers? Check out CyberGuy's Ultimate Scam Survival Guide and subscribe to the free CyberGuy Report, where I share my expert tech tips, crucial security alerts, and awesome deals!
A man furiously working on his laptops (CyberGuy himself)
Here's the lowdown on "time-traveling hackers"
When we say "time-traveling hackers," we're not talking about Marty McFly and his DeLorean here. Instead, this refers to a sophisticated cyberattack technique where hackers manipulate a system’s internal clock to bypass security measures, a tactic used by the Medusa ransomware gang.
In this attack, hackers target a device's security certificate's expiration date by changing the system's internal clock. Once they set the clock back to a moment when those certificates were still valid, outdated malware signed with those certificates can slip through unnoticed. These old-school, nefarious programs can now fool the system into thinking they're trustworthy, and voilà—the hackers gain access to your device.
This technique was notably used in Medusa ransomware attacks that targeted critical infrastructure earlier in 2025, affecting over 300 critical infrastructure targets. The hackers combined this clever method with social engineering and exploiting unpatched vulnerabilities to multiply their threats.
Psst! The FBI advises that such attacks pose a significant risk. They can bypass modern security protections like Windows Defender by tricking the system into accepting outdated drivers or software as legit.
A woman scrolling through her laptop while on her phone (That’s our CyberGuy, again!)
Got double trouble with the "doubleclickjacking" hack?
When it comes to disaster zones, traditional search and rescue tools can be a hassle. Cameras can only follow straight paths, making teams cut through debris just to gain a clearer view. Rigid robots aren't very flexible, and they're expensive to fix when things go wrong. And manual probing is tedious, time-consuming, and potentially dangerous.
Relentless hackers abandon Windows for your Apple ID
Attention all Apple users! Hackers have taken an interest in your Apple ID, so keep an eye out for suspicious activity. Don't let the "it can't happen to me" attitude leave you vulnerable.
5 ways to secure yourself against Medusa malware
- Invest in powerful antivirus software: Don't just rely on antivirus for old-school threats anymore. Modern antivirus software can detect phishing links, block malicious downloads, and prevent ransomware attacks. So go ahead and check out my recommendations for the best 2025 antivirus protection for your Windows, Mac, Android, and iOS devices.
- Activate two-factor authentication (2FA): The FBI strongly suggests enabling 2FA across all services, especially high-value targets like webmail accounts, VPNs, and remote access tools. 2FA makes it harder for attackers to break in, even if they've managed to steal your usernames and passwords with phishing or other tactics.
- Use secure, unique passwords: Ransomware groups like Medusa rely on reused or weak passwords to gain access. Use strong, complex passwords (long, random, and unique) to reduce your risk. A password manager can help you generate and save these passwords, so you don't have to remember them all.
- Monitor suspicious system time changes: The core of this "time-traveling" attack is clock manipulation. Keep a close eye on your system's time for any unusual changes, and if you manage an organization, use tools that will flag and log system configuration shifts.
- Maintain up-to-date systems: The Medusa ransomware campaign has a history of exploiting unpatched systems. Regularly update your devices' OS, applications, and drivers to keep your vulnerable entry points to a minimum.
CyberGuy's final thoughts:
The Medusa attack highlights just how adaptable cybercriminals can be. Instead of using traditional methods like brute force or glaring exploits, they're targeting the very logic that systems rely on to function, like the system clock. This type of strategy makes us question the default assumptions built into the tech we use daily. So stay vigilant out there, and protect yourself!
What are your thoughts on tech companies supporting users in safeguarding their data and devices? Let us know at Cyberguy.com/Contact. Subscribe to the free CyberGuy Report Newsletter for more tech tips and security alerts!
Kurt "CyberGuy" Knutsson is an award-winning tech journalist who graces our website and FOX Business with his contributions, often shining bright on "FOX & Friends." Have a specific tech question? Drop Kurt a line at Cyberguy.com/Contact.
Stay cyber smart, folks! Keep up-to-date by following Kurt on his social channels:
- YouTube
- In the realm of technology, the cyber threat known as "time-traveling hackers" is becoming increasingly common among criminal groups.
- This sophisticated technique involves manipulating a system's internal clock to bypass security defenses, a tactic used by ransomware gangs like Medusa.
- The Medusa ransomware gang exploits expired security certificates by adjusting the system date on a targeted device, making past malware appear harmless due to outdated but valid certificates.
- According to the FBI, such attacks pose a significant risk, as they can bypass modern security protections like Windows Defender by tricking the system into accepting outdated drivers or software as legitimate.
- To mitigate the risks of "time-traveling hackers," consider implementing strong anti-virus software, enabling two-factor authentication, using secure, unique passwords, monitoring suspicious system time changes, and maintaining up-to-date systems.


