Larry Seltzer
In the world of security oldies-but-goodies, nothing beats phishing. It's a problem that goes back to the early days of the mass-online world.The term "phishing" dates back to 1995 in the malware "AOHell," which included "a fisher [sic] that allows a user to pose as an AOL official and ask new members for passwords or […]
Katherine Gorham
“What if everyone just stopped paying ransomware?” asked almost everyone, after more than a decade of governments and information security experts began begging them to ask that question. It turns out that things go badly for ransomware gangs when this happens. The article goes into some detail about economic trends in the ransomware space, and […]
Katherine Gorham
Hundreds of thousands of technologists have been laid off in the United States alone over the past year—something that’s been noticed, of course, in other countries. In most cases, the companies laying tech workers off are simultaneously posting significant or even record profits, and this has led some frustrated individuals to weaponize ransomware against their […]
How does ransomware work? It starts with a vulnerability on your network. That vulnerability can take many forms: a phishing email that someone opens, a compromised password, or a malicious website a worker is convinced to visit.
And the less secure an organization’s IT infrastructure, the more likely it is to be victimized by ransomware. An unpatched, Internet-facing server is especially vulnerable, as is an application that’s not up-to-date. Networks can be hacked if they have weaknesses in a router. Operating systems of all kinds are juicy targets for ransomware.
The same goes for end-user systems, like desktops, laptops, and mobile phones. These attacks can rely on a combination of “social engineering”—fooling users into unsafe actions like clicking on email links or downloading attachments—and technical methods of entry, like automated attacks that look for vulnerabilities.
Once it gets on the network ...
... it’s pretty much Game Over for an organization. Files are encrypted, and the only way to decrypt them is with the mathematical key held by the attacker. At that point, it’s pay up (usually in Bitcoin or other cryptocurrency) or lose all the data.
Companies are having discussions on whether or not to pay the ransom. Paying is unwise, for numerous reasons. Two of the most important are
Rarely is all the data recovered. Statistics show that about 65% of the data is recovered on average.
Once a company shows a willingness to pay, they become targets for more attacks. This can be in the form of another ransomware attack immediately following the first, or a blackmail attempt whereby the hackers threaten to publicly release the confidential data stolen unless the company pays up again.
Primary cloud file storage solution with the built-in ability to recover file shares from a ransomware attack or random disaster.
On-premises and cloud continuous data recovery platform for backup and disaster recovery. Highly granular.
Identity and access management, policy enforcement, and BYOD controls.
Firewall security management platform, VPN, and IoT security.
Multi-cloud security, management and automation.
Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t Worry, We Hate Spam Too
What kinds of ransomware is out there in the wild?
While there are plenty of ransomware examples, and a nearly infinite number of variations, some types remain popular with hackers, and pop up again and again.
Ransomware news is everywhere these days. It’s nearly impossible for a week to go by without reading or hearing about another company that was hit by an attack.
The most recent gold standard for ransomware in the news, of course, is the Colonial Pipeline attack in May 2021. In that attack, which hit the source of 45% of the fuel used on the Eastern Seaboard of the United States, a criminal gang of hackers calling itself DarkSide caused the price of fuel to briefly skyrocket.
It served as a wakeup call to many—not only the brazenness of the attack, but the ability of ransomware to take out a critical bit of U.S. infrastructure shook up the IT industry, bringing a new urgency to efforts to protect and defend against the ransomware plague.
In a recent story about the growing threat of ransomware, it was reported in late September 2021 that Russian hackers launched a ransomware attack against two farming co-ops in Iowa and Minnesota. The Minnesota attacks badly disrupted the victims’ daily operations. In the other attack, the hackers demanded a $5.9 million payment in cryptocurrency, which is the favored payment method.
Unfortunately, the ransomware news isn’t likely to slow down anytime soon.
Ransomware.org is currently establishing vendor partnerships. Here are a few reasons why your organization should partner with us.
Guaranteed lead gen programs (from hundreds to thousands per quarter)
Tell us about your Organization and why you would like to partner with us…
Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t Worry, We Hate Spam Too