Story image

CryptoWall nets US$325 million; Is your business secure?

03 Nov 2015

A single cybercrime group may be collecting all the revenue from CryptoWall 3 according to a new report from the Cyber Threat Alliance, which has issued its recommendations to businesses on how to keep secure.

The Cyber Threat Alliance is an industry group whose co-founders include Fortinet, Intel Security, Palo Alto Networks and Symantec.

Their report, Lucrative Ransomware Attacks: Analysis of the CryptoWall Version 3 Threat, says more than US$325 million was gained from CryptoWall 3, which appeared earlier this year, including ransoms paid by victims to decrypt and access their files.

The report says 406,887 attempted CryptoWall infections were recorded, with the hundreds of millions of dollars damage wrought by the ransomware spanning hundreds of thousands of victims across the globe.

Earlier this week, virtual private network and managed services provider BCT reported that an increasing number of Australian companies have fallen victim to the new strain of Cryptolocker in recent months.

The Cyber Threat Alliance says there are steps organisations can take to lessen their risk of falling victim to CryptoWall v3 and other forms of advanced malware.

It recommends:

- Ensuring your operating systems, applications and firmware are updated with the latest versions of the software.

- Understanding typical phishing techniques and how to thwart them, such as by not opening email from unknown email addresses or attachments of certain file types. 

- Keeping web browsers updated, and turning on settings to disable browser plugins, such as Java, Flash and Silverlight, preventing them from running automatically. 

- Reviewing access and security policies within corporate networks to limit access to critical infrastructure from systems and users who don’t need it.

Joe Chen, Symantec vice president of engineering, says the Cyber Threat Alliance’s first major target is ransomware threats like CryptoWall which are growing at an alarming rate and holding critical business and consumer data hostage.

Derek Manky, Fortinet global security strategist, says the explosion of connected devices and our reliance on digital platforms has created an environment that is both empowering and creating new ways for adversaries to penetrate networks.

“Managing this risk is a shared responsibility,” Manky says. “We need to step forward and not wait for the adversary to make the move first.

“When we grow our collective intelligence across all sectors, we can better combat advanced threats, deploy security controls to counteract the latest moves and deliver greater security for our customers and all organisations.”

Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.