{"id":151966,"date":"2016-10-20T09:11:00","date_gmt":"2016-10-20T14:11:00","guid":{"rendered":"https:\/\/www.ntegrait.com\/fbi-warning-cites-more-highly-targeted-and-expensive-ransomware-attacks\/"},"modified":"2024-02-06T11:58:10","modified_gmt":"2024-02-06T11:58:10","slug":"fbi-warning-cites-more-highly-targeted-and-expensive-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/fbi-warning-cites-more-highly-targeted-and-expensive-ransomware-attacks\/","title":{"rendered":"FBI Warning Cites More Highly-Targeted and Expensive Ransomware Attacks"},"content":{"rendered":"
In a September 16 alert, the FBI warned of ransomware variants that are more frequently targeting highly-vulnerable business servers and how they are like a focused virus, looking for big servers without adequate security defenses. The law enforcement agency also noted that the number of compromised network servers and devices have drastically multiplied, via more target-specific attacks. Even with the huge spike in ransomware attacks<\/a>, only 600 FBI agents are available right now to investigate ransomware attacks, which can only cover a portion of the attacks. This means we all have to play a bigger part in preventing ransomware attacks.<\/p>\n Don’t Pay the Ransom, Says the FBI <\/strong><\/p>\n Instead of complying with cybercriminals who only gain more leverage and confidence with every ransomware payoff, the FBI has officially informed ransomware victims not to pay the ransom. Instead, says the agency, contact your local FBI office and\/or file a complaint with the Internet Crime Complaint Center at www.IC3.gov<\/a>. Don’t pay the ransom. There is no guarantee that paying it will even return you your data files. There are documented cases where organizations have paid to get the decryption key and were ignored. Paying the ransom only emboldens and aids cybercriminals<\/a> in their exploits. The FBI does, however, recognize and understand instances where executives weighed the cost of having inoperability issues vs. the relatively low cost of a ransom note request (roughly $600 on average).<\/p>\n The FBI asks that ransomware victims provide the following details regarding your experience, where applicable:<\/p>\n How to Prevent a Ransomware Attack<\/strong><\/p>\n First, you will want to implement cyber safety education and awareness policies in the workplace. It has been shown that a more well-educated and aware office staff will be far less likely<\/em> to click on questionable links such as those embedded in email phishing schemes that routinely dole out ransomware exploits. Having effective cybersecurity policies in the workplace<\/a> that are strictly followed will also greatly reduce the chances of a ransomware attack. This is, of course, in addition to the antivirus and firewall security technology you will also want to have in place.<\/p>\n Frequently backing up your data is among the best ways to avoid ransomware attacks<\/a>. With effective backup measures implemented, you can more confidently ignore ransomware demands and encryptions. Always have backups in place that aren’t attached to PCs or networks. Malware and viruses can even infiltrate data files that are backed-up via cloud servers (known as “persistent synchronization<\/a>”), so store at least one complete backup of your entire data network on a completely network-disconnected machine or device.<\/p>\n You’ll also want to:<\/p>\n Ransomware Quick Facts<\/strong><\/p>\n<\/p>\n
\n
\n