By Luana Pascu on Mar 24, 2017 |
In 2016, the number of ransomware attacks increased 300 percent from 2015, with over 4,000 attacks detected per day, according to US government statistics. Ransomware is among the worst types of infection, as it not only encrypts network data, but in the end may cost victims all their data – even if they pay the ransom. It should be a priority for all businesses and organizations in 2017. Ransomware is not limited to consumer networks; it’s one of the most sophisticated types of malware that targets all internet users, from private individuals to corporate networks to government agencies. Ransomware attacks on enterprises affect shareholders, employees and customers, and could lead to permanent damage caused by loss of confidential information, negative publicity and financial loss. By George V. Hulme on Mar 23, 2017 |
A vital, actually a most fundamental, aspect of enterprise security is helping organizations to keep confidential information confidential. This is why security at the data and document level is something to which much more attention should be paid by enterprises. And a report, Getting Control of Document Flow: Exploring Exposure and Risk In Document-Related Data Breaches, just issued from the Business Performance Innovation (BPI) Network (sponsored by Foxit software) found that 60 Percent of survey respondents said sensitive documents have accidentally been sent to someone who probably wasn’t authorized to see the document. No big surprise there, in fact I think most of us have forwarded something we shouldn’t have to someone at some point in our work lives. The BPI Network survey, based on responses from business owners, CEOs, executives and knowledge workers from more than 200 companies from various nations was fielded in the final quarter of 2016 and part of first quarter 2017. It found that 89 percent of those surveyed believe that increased connectivity and mobile devices is increasing document risk. How to Stay Safe from Ransomware Attacks
Blackmailers have claimed another scalp, extorting US $28,000 from a school hit by a ransomware attack.
Los Angeles Community College District (LACDD) agreed to pay the hefty ransom demand to criminals who successfully infected the network of Los Angeles Valley College (LAVC) in a ransomware attack on December 30th, 2016. It’s always disappointing, of course, to hear that a ransomware attack has again resulted in a payout for criminals, but it’s understandable how some organisations might have to make a difficult pragmatic decision if it has few other options open to it. Recent predictions about the massive growth of ransomware attacks seem to be materializing, with another major breach. This one, on Dec. 27, led to the compromise of some 1.5 million user records, according to LeakedSource.
E-Sports Network ESEA, a platform for video game tournaments, did not detect the hack, but was informed by hackers who asked for $100,000 to not leak or sell the data on the black market. The company exchanged emails with the hackers, asked the FBI for help and started informing customers about the hack. Ransomware, the fastest-growing cyber threat, became the main danger to users of the Android operating system in the first half of 2016, recent Bitdefender telemetry shows.
Bitdefender’s Android statistics show the Android SLocker ransomware family accounts for almost half of all mobile malware reported by infected devices in H1 2016 in Denmark, and a quarter in Germany. Australia came third, with 21.54 percent, while the UK scored 16.48 percent. In the United States, ransomware accounted for 16 percent. A targeted spam wave is infecting Windows computers with a backdoor capable of stealing sensitive corporate information from medium and small-sized businesses.
Bitdefender antispam researchers have identified a couple of thousand emails containing .pub attachments posing as orders and invoices for products. The email senders impersonate employees from small and medium-sized businesses from the UK and China, as well as other legitimate companies. Ransomware, the most prolific cyber threat of the moment, gains foothold in organizations and companies via file-sharing networks, e-mail attachments, malicious links or compromised websites that allow direct downloads. The first quarter of 2016 saw 3,500% growth in the number of ransomware domains created, setting a new record.
According to a Bitdefender study carried in the United States last year, ransomware is mentioned second in the top CIO concerns for medium and large companies. According to the findings of that study, 13.7 percent of the interviewed companies perceive ransomware as a hard-to-tackle threat. The study also shows that ransomware and rootkits are perceived as particularly difficult to tackle by companies with limited experience in malware attacks. Bitdefender antimalware researchers have put together a checklist of things to do to avoid getting infected with Cryptowall.
Cryptowall is a form of ransomware that uses the same encryption and extortion mechanisms as a previous threat, dubbed Cryptolocker. Local files are encrypted using a randomly generated 2048-bit RSA key pair that’s associated with the infected computer. While the public key is copied on the infected computer, the private key can only be obtained by paying for it within an allocated amount of time. If payment is not delivered, the private key is supposed to be deleted, leaving no possible unencrypting method for recovering the locked files. One of the most common infection vectors relies on drive-by-attacks through infected ads on legitimate websites, but it has also been known to infect via infected downloaded apps. |
Protect from RansomwareBuy Bitdefender now RECOMMENDED READINGs
All
|