sb-nz logo
Story image

Avast joins watchdog ranks as No More Ransom partner

10 May 2017

The No More Ransom initiative is a global campaign supported by major law enforcement agencies around the world, including the likes of Japan’s Cybercrime Control Center, INTERPOL, the Singapore Police Force and other partners from the private sector.

Avast is one of the latest security providers to join the club - having signed up in April 2016 - and says it is tackling the malware problem head on.

“Ransomware has become a lucrative business for cybercriminals. We saw a 105% increase in ransomware attacks from 2015 to 2016,” comments Jakub Kroustek, threat lab team lead and co-creator of Avast’s ransomware decryption tools.

No More Ransom launched last year and has so far made 40 free decryption tools available for ransomware victims, including tools for the Crysis, TeslaCrypt, HiddenTear, Chimera, WildFire  and other forms of ransomware.

Avast says that ransomware has become one of the biggest threats that users face today. No More Ransom helps victims get their files back - without having to give in to criminals.

“The No More Ransom project will hopefully raise awareness around the free decryption tools that are available. If we can lower the number of ransoms paid, we can help make ransomware less attractive for cybercriminals,” Kroustek says.

Avast says that in 2016 the average ransom demand equated to $500 and spread through phishing or exploit kits. Hackers that don’t have technical knowledge can now buy, modify and distribute ransomware, which means new strains appear daily.

Avast recommends that users use security solutions and back up files to an external drive that is not connected to a computer or the internet.

Story image
The business case for an in-house ethical hacker
Ethical hackers, also known as penetration testers or white-hat hackers, mimic the techniques used by malicious hackers to try and break into computer systems and discover vulnerabilities before the bad guys can exploit them.More
Story image
Video: 10 Minute IT Jams - Who is LogRhythm?
LogRhythm VP of sales for Asia Pacific Simon Howe, who discusses the company's primary offerings and services, what products the company is focused on for the future, and the infrastructure it has in the A/NZ market.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
DDoS attacks a wake up call for complacent businesses - Imperva
When distributed denial of service attacks created mayhem around the world in August, they left many organisations scrambling to protect themselves.More
Story image
Insider threat report reveals deception in the workforce
Insider threats come from people inside an enterprise, whether they divulge proprietary information with nefarious intentions, or are just careless employees that unwittingly share sensitive data, writes Bitglass product marketing manager Juan Lugo.More