Katherine Gorham
The LockBit ransomware operators have had a busy new year, with a notable attack on Britain’s Royal Mail that disrupted the postal service’s ability to send international letters and parcels: Royal Mail ransomware attackers threaten to publish stolen data. However, it seems that there are some targets LockBit feels should be off-limits.When LockBit’s ransomware was […]
Katherine Gorham
Even if you aren’t worried quite yet about the increasing ease of writing malware, you should probably be deeply, deeply concerned about the major credential and personally identifiable information (PII) thefts that have happened over the past year or so. Here are just a few:Getting access to networks is especially easy right now. There have […]
Katherine Gorham
It just keeps getting easier to create ransomware. Last year, schoolkids were doing it. Just last month, ransomware went open source. And now ChatGPT is enabling script kiddies to write functional malware. But just how big a threat is this, really?In the real world, the part where AIs can write code isn’t particularly scary. Yes, […]
How does ransomware work? It starts with a vulnerability on your network. That vulnerability can take many forms: a phishing email that someone opens, a compromised password, or a malicious website a worker is convinced to visit.
And the less secure an organization’s IT infrastructure, the more likely it is to be victimized by ransomware. An unpatched, Internet-facing server is especially vulnerable, as is an application that’s not up-to-date. Networks can be hacked if they have weaknesses in a router. Operating systems of all kinds are juicy targets for ransomware.
The same goes for end-user systems, like desktops, laptops, and mobile phones. These attacks can rely on a combination of “social engineering”—fooling users into unsafe actions like clicking on email links or downloading attachments—and technical methods of entry, like automated attacks that look for vulnerabilities.
Once it gets on the network ...
... it’s pretty much Game Over for an organization. Files are encrypted, and the only way to decrypt them is with the mathematical key held by the attacker. At that point, it’s pay up (usually in Bitcoin or other cryptocurrency) or lose all the data.
Companies are having discussions on whether or not to pay the ransom. Paying is unwise, for numerous reasons. Two of the most important are
Rarely is all the data recovered. Statistics show that about 65% of the data is recovered on average.
Once a company shows a willingness to pay, they become targets for more attacks. This can be in the form of another ransomware attack immediately following the first, or a blackmail attempt whereby the hackers threaten to publicly release the confidential data stolen unless the company pays up again.
On-premises and cloud continuous data recovery platform for backup and disaster recovery. Highly granular.
Primary cloud file storage solution with the built-in ability to recover file shares from a ransomware attack or random disaster.
Network monitoring, asset inventory, access control.
Endpoint detection and response. Prioiritizes alerts for fast threat hunting and resolution.
Visibility, policy enforcement, and control of USB devices.
Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t Worry, We Hate Spam Too
What kinds of ransomware is out there in the wild?
While there are plenty of ransomware examples, and a nearly infinite number of variations, some types remain popular with hackers, and pop up again and again.
Ransomware news is everywhere these days. It’s nearly impossible for a week to go by without reading or hearing about another company that was hit by an attack.
The most recent gold standard for ransomware in the news, of course, is the Colonial Pipeline attack in May 2021. In that attack, which hit the source of 45% of the fuel used on the Eastern Seaboard of the United States, a criminal gang of hackers calling itself DarkSide caused the price of fuel to briefly skyrocket.
It served as a wakeup call to many—not only the brazenness of the attack, but the ability of ransomware to take out a critical bit of U.S. infrastructure shook up the IT industry, bringing a new urgency to efforts to protect and defend against the ransomware plague.
In a recent story about the growing threat of ransomware, it was reported in late September 2021 that Russian hackers launched a ransomware attack against two farming co-ops in Iowa and Minnesota. The Minnesota attacks badly disrupted the victims’ daily operations. In the other attack, the hackers demanded a $5.9 million payment in cryptocurrency, which is the favored payment method.
Unfortunately, the ransomware news isn’t likely to slow down anytime soon.
Ransomware.org is currently establishing vendor partnerships. Here are a few reasons why your organization should partner with us.
Guaranteed lead gen programs (from hundreds to thousands per quarter)
Tell us about your Organization and why you would like to partner with us…
Sign Up To Receive Our Monthly Ransomware Newsletter
Don’t Worry, We Hate Spam Too