Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Ransomware on the Rise: How to Keep You & Your Company Safe
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Ransomware on the Rise: How to Keep You & Your Company Safe

5 years ago Tripwire Guest Authors
Ransomware on the Rise: How to Keep You & Your Company Safe

Due in large part to COVID-19 and the increased prevalence of remote work, ransomware attacks dominated 2020, and experts predict there will be at least twice as many cases of data theft in the new year.

The U.S. Cybersecurity & Infrastructure Security Agency defines ransomware as “a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid.” It often spreads through phishing emails or when a person inadvertently visits a compromised website. 

Ransomware attacks, however, aren’t new; the first one dates back to 1989, and over the years, the attacks have become more sophisticated and advanced as equipment and technological capabilities have changed.

This rise in cybersecurity crime is why there’s a growing need for cybersecurity professionals to work against these threats. That includes people called penetration testers (also known as ethical hackers). Their job is to infiltrate computer systems on purpose in order to detect and address vulnerabilities that non-ethical hackers could exploit to cause havoc.

Now let’s explore the details of a ransomware attack, the most common types of attacks and how you can protect your company against this potentially crippling catastrophe. 

How Does a Ransomware Attack Work?

In order to become victim to a cyber-attack, you must first allow criminals access to your computer system or network. Of course, you don’t “allow” access on purpose, but have you ever received a suspicious-looking email or pop-up advertisement? Criminals will access your system through a “vector,” some of which include:

  • Email attachments
  • Social media messages (example: Facebook friend requests)
  • Pop-ups

These attachments and messages are designed to look real, of course, so that you’ll click on them, which allows criminals access to your files and information. Once you do so, however, the ransomware will encrypt your files.

As CNN explains, “The attacker then typically demands a ransom from the victim to restore access to the data upon payment. Users are often shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, often payable to cybercriminals in Bitcoin.”

Some have even cost millions of dollars.

Common Types of Ransomware Attacks

REvil

REvil (short for Ransomware Evil) is known as aransomware-as-a-service (RaaS) operation that extorts large chunks of money. It’s also considered the most widespread type of ransomware threat; the actor behind this type of attack also “steals business data and threatens to release it.” They also often rely on other cybercriminals (known as “affiliates”) to distribute the ransomware.

Ryuk

This type of ransomware — which is estimated to be responsible for more than a third of ransomware attacks in 2020 — encrypts important business files and demands a high ransom (usually millions of dollars), according to Datto. Ryuk ransomware has become more popular and is used to target companies, hospitals, government entities and more.

RobinHood

This type of malware “essentially holds a computer or computer system hostage,” according to Verizon. A malicious actor typically infiltrates the system through a phishing scam (or other security weak spots), encrypts the files and leaves a ransom note. If the victim pays (usually in Bitcoin), the data will be returned and the computer system will go back to normal.

DoppelPaymer

This type of ransomware attack is known for “its targeting enterprises by means of gaining access through certain admin credentials and utilizing them in order to spread throughout the whole Windows network,” according to Tech Times. It’s also one of the first forms of ransomware where criminals actually call the victims and further demand payment, according to a notification released by the FBI in December 2020.

Bad Rabbit

This threat spreads through a fake Adobe Flash update. When an infection occurs, users are directed to a payment page.

Notable Ransomware Attacks in 2020

Cyberattacks greatly increased as a result of COVID-19 since many people had to work from home and had less-than-secure servers and networks. You’ve most likely heard of a ransomware attack (or two) over the years; here’s a list of some of the notable ones that occurred recently. 

  • A string of hospitals across the country were the victims of ransomware attacks that started around the end of September 2020. In one case, a Medical Center — with 21 locations in Oregon — was infected with Ryuk and said the staff couldn’t access the computer system. As a result, radiation treatment for cancer patients had to temporarily stop.
  • A university suffered a ransomware attack in July 2020 with approximately .02% of its data being affected, including employee and student information. In the end, the university paid $457,059.24 to the attackers to make sure the data and information wasn’t released.
  • A ransomware attack shut down all network systems of a public school system in November 2020. The school system confirmed in January 2021 that there was no evidence that any data or information was accessed or stolen during the breach. 

According to SafeatLast, about one in four companies around the world pay the ransom, but access to the information or systems is not always restored.

The Impact of Ransomware Attacks

Ransomware attacks can be costly, with organizations paying an average ransom of $233,217. But the attacks also go beyond monetary implications; they often leave companies and organizations feeling vulnerable and emotionally distressed, especially if personal information has been leaked.

According to the Cybersecurity & Infrastructure Security Agency, “ransomware can be devastating to an individual or an organization. Some victims pay to recover their files, but there is no guarantee that they will recover their files if they do. Recovery can be a difficult process that may require the services of a reputable data recovery specialist.”

One of the widespread effects of ransomware, and related cyber-attacks, is the increased demand for skilled cybersecurity professionals to serve as front-line defenders. It’s expected that there will be several million unfilled cybersecurity jobs by next year.

How to Protect Yourself Against Ransomware

More businesses are opting for cyber insurance, with about 84% of organizations investing in it having to further protect themselves against cyber threats and attacks.

The Cybersecurity & Infrastructure Security Agency lists a variety of best practices to protect you and your company against ransomware. These include:

  • Updating software and operating systems with the latest patches
  • Being suspicious of unsolicited emails and avoiding clicking on links or opening attachments within them
  • Backing up data on a regular basis
  • Following safe practices when using devices with internet connections

Other best practices include creating strong passwords, choosing secure networks and keeping software current. It’s also important to report any type of ransomware attack to CISA, a local FBI field office or a Secret Service field office.

At the end of the day, ransomware attacks will never go away, especially as criminals incorporate new techniques and adapt to new technologies. But there are security best practices and steps you can take to protect your business or organization and help ensure that you aren’t the next victim of ransomware.


About the Author:  Chuck Bane is academic director and professor of practice for the University of San Diego’s online Master of Science in Cyber Security Engineering program; he is a retired naval officer whose experience includes collaboration on cybersecurity projects with the Department of Homeland Security, the NSA and the DoD.

Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” Ransomware on the Rise: How to Keep You & Your Company Safe” appeared first on TripWire

Source:TripWire – Tripwire Guest Authors

Tags: COVID-19, Exploit, Facebook, Finance, Goverment, High Severity, Malware, Phishing, Ransomware, TripWire

Continue Reading

Previous Purple Fox Malware Targets Windows Machines With New Worm Capabilities
Next Microsoft Exchange Servers See ProxyLogon Patching Frenzy

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

8 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

9 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

11 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

13 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

16 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT