sb-as logo
Story image

Cisco report reveals ransomware attacks on the rise: Expert commentary

03 Aug 2016

The Cisco 2016 Midyear Cybersecurity Report (MCR) was recently released, with some startling findings – organisations are unprepared for future strains of more sophisticated ransomware.

According to the report, the main contributing factors are fragile infrastructure, poor network hygiene and slow detection rates, which are all providing ample time air cover for cybercriminals to operate. The biggest challenge facing businesses is the struggle to constrain the operational space of attackers, which is threatening the underlying foundation required for digital transformation.

Other key findings include cybercriminals expanding their focus to server-side attacks, ever-changing and evolving methods of attack and the increasing use of encryption to mask activity. What’s more, thus far in 2016 ransomware has become the most profitable malware type in history. Perhaps one of the more concerning revelations is that visibility across the network and endpoints remains a challenge, as on average, organisations take up to 200 days to identify new threats.

Webroot Director of Threat Research, David Kennerly says ransomware is undoubtedly one of the biggest threats facing organisations today. He quotes statistics from the Webroot 2016 Threat Brief, which reveal that 97 percent of malware is morphs to become unique to a specific endpoint.

“Part of the problem is the rate at which polymorphic malware is developing, resulting in thousands of new strands each month,” Kennerly says.” Unfortunately, protecting against ransomware is currently a question of economics. It is often cheaper to pay the ransom to get the data back than the costs of regular back-ups and running the technologies to defend.”

So what can we do?

Recently, the NASCAR team Circle Sport-Leavine Family Racing(CSLFR) were the victims of a ransomware attack and they ended up paying (via Bitcoin) to get their data back.

Kennerly says no matter how tempting it may be, companies should never concede to the criminal and pay the ransom, as it not only fuels the ransomware economy but there is also no guarantee that the data will be returned.

“There have been instances of malware claiming to encrypt the data, but instead it has been deleted so paying the ransom still did not result in the data’s return. Ransomware is a very real threat and organisations and individuals need to ensure that firstly, adequate defences are in place, and secondly, valuable data is backed up so systems can be restored if need be,” Kennerly concludes.

Story image
Surfshark rolls out WireGuard open source VPN protocol
When there is less code in a VPN, it is less susceptible to security vulnerabilities due to easier configuration and management, according to Surfshark.More
Story image
WhiteHawk ramps up cyber revenues with US$1.5 million contract extension
WhiteHawk Limited has been awarded a fiscal 2021 option extension of US$1.5 million (A$2.1M) under an existing seven-year contract.More
Story image
Palo Alto Networks launches new SD-WAN solutions and enhancements
Palo Alto Networks has introduced two new SD-WAN appliances and enhancements to its next-generation SD-WAN solution, expanding the company’s CloudGenix SD-WAN solutions reach.More
Story image
BlueVoyant acquires Managed Sentinel, builds out Microsoft MSS offerings
“Combining Managed Sentinel’s Azure Sentinel deployment expertise with BlueVoyant’s MDR capabilities will help customers operationalise and maximise Microsoft security technologies."More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
Video: 10 Minute IT Jams - protecting data with user behaviour analytics
In this video, Forcepoint senior sales engineer and solutions architect Matthew Bant discusses the company's DLP solution, the importance of integrating compliance into security solutions, and why cybersecurity strategies should take a more people-based approach.More