sb-nz logo
Story image

Ransomware attacks are getting easier, but protection is getting harder

22 Sep 2016

Ransomware is continuing to be an ever-popular and effective method for cyber attacks, and Trend Micro says it's only being made easier with do-it-yourself ransomware kits that are being sold in the deep web.

Stampado is just one of those tools, selling for US$39 that allowed even the most non-technical of would-be attackers to mount a ransomware operation. Ransomware as a Service, or RaaS, relies on internet browsing, spam and outdated software to launch attacks, and from there it's a messy story.

The company says that CryptoWall gained US$325 million from victims, and other ransomware operates in much the same way. Files are encrypted, and hackers make their demands.

Ransomware families have experience a 172% increase in families in the first half of 2016 - higher than what was found in the entire year of 2015.

The company says that for organisations, the effects can vary depending on what data they want to protect. While an attacker doesn't know the importance of a file, blanket attacks on folders, servers and drives allow the hackers to at least gain a few victims.

Organisations affected by those blanket attacks can experience everything from lost sales, unfulfilled orders, productivity losses and critical files. The result can be damaging for not only the company, but its brand and consumer perception.

There is no end or cure in sight for the ransomware threat, as the company states from research that it will only get more complex, evasive and intrusive with time.

While Trend Micro says that there is no cure for ransomware, organisations can use multilayered protection, data backup and recovery, patching and employee education to fight attacks. These collaborative tools will protect networks from ransomware attacks.

Story image
The importance of selecting a secure SD-WAN solution
It’s essential to adopt a secure SD-WAN solution to avoid the risks that an unsecured SD-WAN solution can introduce, writes Wavelink managing director Ilan Rubin.More
Story image
ConnectWise launches bug bounty program to bolster cybersecurity strategy
“Crowdsourcing in this way represents a solid additional layer of security, and we clearly value the community's expertise and participation in helping us keep our products secure."More
Story image
Remote staff overestimating knowledge of cybersecurity basics
‘Unconscious incompetence’ is one of the most difficult issues to identify and solve with security awareness training.More
Story image
Just one click – that’s all it takes to let in cyber-crime
So how do organisations ensure that users are not compromised by simply doing their work?  The answer is surprisingly simple, writes Bufferzone Security business strategist for A/NZ Greg Wyman.More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More