Everything You Need To Know About Ransomware

Ransomware is a type of malware that demands some form of payment from the victim in order to recover control of their computer and data. The payment is usually demanded in a virtual currency, such as bitcoin – this means the cybercriminals identity remains anonymous and difficult to trace.

Unlike usual cyber-attacks, the victim is notified that they are under attack and is given instructions on how to recover from the attack via payment. This payment usually comes with a deadline. If not paid in time as requested, the victims files are encrypted.

How its done

There are multiple ways ransomware can access a computer. Infected software apps, infected external storage devices and compromised websites are all ways hackers can encrypt your data for ransom.

One of the most common ways ransomware attacks can be spread is through malicious email attachments. Malicious email attachments will have an attachment disguised as a legitimate file or a URL link. If either the attachment or link is opened the file will begin encrypting files instantly.

Once the victim’s files have been taken over, they are warned of what is happening through a message presented to them. The only way to decrypt their files is if the victim sends a bitcoin payment to the attacker.

Some attackers may claim to be trustworthy sources meaning the victim may be less likely to report to authorities. However, most attackers don’t take this approach and instead ask for money shamelessly.

Why you should care

Imagine walking into the office one day to see your computer has been locked with a threatening message on the screen. The message is demanding you make a payment in order to retrieve all your files.

You haven’t completed a back-up recently and could potentially lose critical data to your organisation. Think this won’t happen to you? Think again.

Ransomware attacks are on the rise and every organisation is at risk. Your vulnerability can depend on how attractive your data is to hackers, how you respond, your security and how educated your employees are in identifying breaches.

These types of attacks can lead to severe consequences on your business. Potentially impacting your business’s financial performance, reputation and productivity. Organisations with critical data will remain a prime ransomware target. But whatever your size or industry, it’s important to always be vigilant.

Examples of ransomware:

  • WannaCry – This ransomware attack was designed to exploit a vulnerability in Windows. This highlights the issue of how operating on outdated systems could leave you vulnerable to attack. An attack in 2017 affected 230,000 computers globally, hitting a third of hospital trusts in the UK and costing the NHS millions.
  • CryptoLocker –Requires cryptocurrency for payment (Bitcoin) and is spread through infected email attachments. Once this is on your computer, it will search for valuable files and hold them to ransom. Cryptolocker is ransomware that was first seen in 2007 and is thought to have affected around 500,000 computers.
  • BadRabbit – This attack was deployed back in 2017 using a method called a ‘drive-by’ attack. This involves victims visiting what appears to be a legitimate website but instead the site has been compromised by the cyber criminal. Bad rabbit used a fake request to install Adobe Flash as a malware dropper to spread infection. Victims clicked this without realising it was actually malware in disguise.
  • Troldesh – This ransomware attack is spread via spam emails with infected URLS or attachments. Attackers communicate with users directly to demand ransoms. Cyber criminals have even negotiated discounts for victims because they’re able to communicate with each other.

HOW TO PREVENT ATTACKS

REGULAR UPDATES

Keep operating systems patched and up to date to ensure more secure software. Each time you update to the latest security patches, you will maximise ransomware prevention.

n

Back up your files

Backing up your files is a good way to secure yourself from ransomware. While it won’t stop an attack, it can make the damage caused much less significant as all data can be restored to a previous save point.

Educate your staff

It’s important to educate your staff on the threat landscape. Get them into the habit of being vigilant so they can spot and report any potential breaches before they become a problem.

Technology solutions

Investing in good technology like Cisco Umbrella will help you avoid threats before they even hit your network.  It integrates easily with your existing security stack & delivers live threat intelligence about current & emerging threats. With Umbrella, you can stop phishing & malware attacks earlier, identify already infected devices faster & prevent data ex-filtration. 

It’s one of the quickest security features you can apply to your network. Because it is delivered from the cloud, there is no hardware to install or software to manually update. So you can protect all of your users in minutes

Try Cisco Umbrella FREE for 14 days & benefit from cutting edge security at the tap of a button.

Moving To The Cloud

Businesses of all sizes are taking advantage of the benefits of cloud computing. This refers to the usage of computer services over the internet. Cloud computing can offer businesses a much more scalable and reliable IT infrastructure, both of which help towards...

Tips To Staying Productive While Remote Working

The current situation the world is facing has led to a huge surge in people forced to work from home. While this is not a new concept for some, for others that are used to the daily commute to the workplace, remote working can feel a little bit alien. And although the...

Ransomware Statistics: Cyber Threats in Numbers

Ransomware is a type of malware sent by cyber criminals, often for financial gain. It's tactics have matured over the years from mass-volume, low-return targeting of consumers, to low-volume high-return targeting of businesses. And ransomware statistics where...

Everything You Need To Know About Ransomware

Ransomware is a type of malware that demands some form of payment from the victim in order to recover control of their computer and data. The payment is usually demanded in a virtual currency, such as bitcoin – this means the cybercriminals identity remains anonymous...

4 Tips To Creating a Human Firewall by Steve Shields

The human firewall concept The Human Firewall is the idea that your staff and their knowledge of cyber attacks is one the most important elements of your cyber security strategy. As technology has advanced to better understand the threat landscape, criminals have had...

Why Your Network is Key to Business Security

Every year organisations dedicate a substantial chunk of their investment towards network security. As the internet grows, it has become more essential than ever to secure every aspect of your network. It is one of the most important aspects for businesses to...

Working From Home – Your Options

Government guidelines on the COVID-19 (Coronavirus) pandemic and what UK businesses should do seems to change daily. Despite this, the consistent and overwhelming message from officials is that in order to delay and contain the spread of the virus, those that can work...

Protecting your Network: The Basics

As an organisation that wants to deliver the services that customers and employees demand you must make sure you're protecting your network. Breaches to network security and computers happen daily, costing businesses money, time and putting their reputation at stake....

Meraki MR/Umbrella Integration: Seamless Network Security

It is estimated that around 50% of the workforce is mobile and reliant on WIFI in order to operate. Whilst this is great for allowing productivity and efficiency to flourish, it can be a problem if the right security measures aren’t put in place. That’s because the...

Why Pure Cloud Solutions Uses Cisco Meraki …

Threats to our business' network security are everywhere. Ensuring your network is secure can often appear to be a complicated, tedious job. But we like keeping things simple - that's why we use Meraki. In most cases, business' don't have the time or knowledge to...

Previous

Next

Submit a Comment

Your email address will not be published. Required fields are marked *

Pin It on Pinterest

Share This