Story image

Cisco report reveals ransomware attacks on the rise: Expert commentary

03 Aug 16

The Cisco 2016 Midyear Cybersecurity Report (MCR) was recently released, with some startling findings – organisations are unprepared for future strains of more sophisticated ransomware.

According to the report, the main contributing factors are fragile infrastructure, poor network hygiene and slow detection rates, which are all providing ample time air cover for cybercriminals to operate. The biggest challenge facing businesses is the struggle to constrain the operational space of attackers, which is threatening the underlying foundation required for digital transformation.

Other key findings include cybercriminals expanding their focus to server-side attacks, ever-changing and evolving methods of attack and the increasing use of encryption to mask activity. What’s more, thus far in 2016 ransomware has become the most profitable malware type in history. Perhaps one of the more concerning revelations is that visibility across the network and endpoints remains a challenge, as on average, organisations take up to 200 days to identify new threats.

Webroot Director of Threat Research, David Kennerly says ransomware is undoubtedly one of the biggest threats facing organisations today. He quotes statistics from the Webroot 2016 Threat Brief, which reveal that 97 percent of malware is morphs to become unique to a specific endpoint.

“Part of the problem is the rate at which polymorphic malware is developing, resulting in thousands of new strands each month,” Kennerly says.” Unfortunately, protecting against ransomware is currently a question of economics. It is often cheaper to pay the ransom to get the data back than the costs of regular back-ups and running the technologies to defend.”

So what can we do?

Recently, the NASCAR team Circle Sport-Leavine Family Racing(CSLFR) were the victims of a ransomware attack and they ended up paying (via Bitcoin) to get their data back.

Kennerly says no matter how tempting it may be, companies should never concede to the criminal and pay the ransom, as it not only fuels the ransomware economy but there is also no guarantee that the data will be returned.

“There have been instances of malware claiming to encrypt the data, but instead it has been deleted so paying the ransom still did not result in the data’s return. Ransomware is a very real threat and organisations and individuals need to ensure that firstly, adequate defences are in place, and secondly, valuable data is backed up so systems can be restored if need be,” Kennerly concludes.

Hillstone CTO's 2019 security predictions
Hillstone Networks CTO Tim Liu shares what key developments could be expected in the areas of security compliance, cloud, security, AI and IoT.
Can it be trusted? Huawei’s founder speaks out
Ren Zhengfei spoke candidly in a recent media roundtable about security, 5G, his daughter’s detainment, the USA, and the West’s perception of Huawei.
Oracle Java Card update boosts security for IoT devices
"Java Card 3.1 is very significant to the Internet of Things, bringing interoperability, security and flexibility to a fast-growing market currently lacking high-security and flexible edge security solutions."
Updated: Chch crypto-exchange Cryptopia suffers breach
Cryptopia has reportedly experienced a security breach that has taken the entire platform offline – and resulted in ‘significant losses’.
Sophos hires ex-McAfee SVP Gavin Struther
After 16 years as the APAC senior vice president and president for McAfee, Struthers is now heading the APJ arm of Sophos.
Security platform provider Deep Instinct expands local presence
The company has made two A/NZ specific leadership hires and formed several partnerships with organisations in the region.
Half of companies unable to detect IoT device breaches
A Gemalto study also shows that the of blockchain technology to help secure IoT data, services and devices has doubled in a year.
Stepping up to sell security services in A/NZ
WatchGuard Technologies A/NZ regional director gives his top tips on how to make a move into the increasingly lucrative cybersecurity services market.