{"id":179391,"date":"2018-08-17T14:19:09","date_gmt":"2018-08-17T19:19:09","guid":{"rendered":"https:\/\/www.ntegrait.com\/august-2018-ransomware-update\/"},"modified":"2024-02-06T13:29:56","modified_gmt":"2024-02-06T13:29:56","slug":"august-2018-ransomware-update","status":"publish","type":"post","link":"https:\/\/ntegrait.com\/august-2018-ransomware-update\/","title":{"rendered":"August 2018 Ransomware Update"},"content":{"rendered":"

The Newest Forms Of Ransomware & How To Protect Your Business From Them<\/h2>\n

\"2018<\/p>\n

The Situation<\/strong><\/p>\n

Ransomware is now one of the top security concerns for businesses and organizations of all sizes. The City of Atlanta was hit with a ransomware attack called SamSam in March, crippling some important departments like their court system, sewer infrastructure requests, and water billing department.<\/p>\n

The attackers who deploy SamSam are known for clever, high-yield approaches. This, combined with the City\u2019s lack of preparedness, explains why the infection was so debilitating.<\/p>\n

Experts are telling us that SamSam will strike again. Unlike many forms of ransomware that spread via phishing attacks where individuals inadvertently invite the attack, SamSam exploits IT system vulnerabilities and cracks weak passwords. These ransomware attackers have made $1 million in less than six months.<\/p>\n

Keeping all your systems patched, storing data in enterprise-based cloud backups, and having a ransomware preparedness plan can offer real protections against SamSam and other ransomware infections.<\/p>\n

Unfortunately, ransomware attacks are on the rise, and as hackers use more sophisticated encryption technology, the threat is constantly evolving. According to malware security firm Barkly<\/a>, a company is hit with a ransomware attack every 40 seconds. They also identified ransomware as the most prevalent form of malware, with \u201c4.3x new ransomware variants in Q1 2017 than in Q1 2016.\u201d<\/p>\n

This eBook details how dangerous ransomware is, how it could harm your business, and what you should do to protect your data. <\/strong><\/p>\n

Part 1<\/h2>\n

What is Ransomware?<\/h2>\n

Ransomware is a type of malicious software (malware) that blocks access to a computer that infects, locks or takes control of a system and demands a ransom to unlock it. It\u2019s also referred to as a crypto-virus, crypto-Trojan or crypto-worm. It then threatens that your data will be gone forever if you don\u2019t pay using a form of anonymous online currency such as Bitcoin.<\/p>\n

Most forms of ransomware are spread via spam using unsolicited phishing email or an attachment. Phishing attacks use emails disguised to look like they\u2019re from someone you know and are more likely to trust.<\/p>\n

Some ransomware-based applications disguise themselves as police or a government agency, claiming that your system is being locked down for security reasons and that a fine or fee is required to reactivate it. Then it typically asks you to click on a link or attachment to perform a routine task such as updating records or account details. If you do this, a worm or malware is downloaded, infects your system and locks it by encrypting your files.<\/p>\n

Ransomware, like SamSam, can also infect your IT system using vulnerabilities in your computer\u2019s browser. It does this when you click on a malicious code hidden in online ads or free software.<\/p>\n

Ransomware targets small to medium-sized businesses because they are particularly vulnerable due to limited IT resources. They are also more likely to pay the ransom in the hopes that they\u2019ll get access to their data, although the FBI warns<\/a> that this isn\u2019t necessarily so.<\/p>\n

\u201cPaying a ransom doesn\u2019t guarantee an organization that it will get its data back\u2014we\u2019ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cybercriminals to target more organizations, but it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.\u201d<\/p>\n

Paying the ransom<\/strong> only guarantees that the malicious actors receive your money, and possibly even banking information. Also, decrypting files does not mean the malware infection itself has been removed.<\/strong><\/p>\n

No one is immune. <\/strong><\/p>\n