sb-as logo
Story image

Ransomware attacks are getting easier, but protection is getting harder

22 Sep 2016

Ransomware is continuing to be an ever-popular and effective method for cyber attacks, and Trend Micro says it's only being made easier with do-it-yourself ransomware kits that are being sold in the deep web.

Stampado is just one of those tools, selling for US$39 that allowed even the most non-technical of would-be attackers to mount a ransomware operation. Ransomware as a Service, or RaaS, relies on internet browsing, spam and outdated software to launch attacks, and from there it's a messy story.

The company says that CryptoWall gained US$325 million from victims, and other ransomware operates in much the same way. Files are encrypted, and hackers make their demands.

Ransomware families have experience a 172% increase in families in the first half of 2016 - higher than what was found in the entire year of 2015.

The company says that for organisations, the effects can vary depending on what data they want to protect. While an attacker doesn't know the importance of a file, blanket attacks on folders, servers and drives allow the hackers to at least gain a few victims.

Organisations affected by those blanket attacks can experience everything from lost sales, unfulfilled orders, productivity losses and critical files. The result can be damaging for not only the company, but its brand and consumer perception.

There is no end or cure in sight for the ransomware threat, as the company states from research that it will only get more complex, evasive and intrusive with time.

While Trend Micro says that there is no cure for ransomware, organisations can use multilayered protection, data backup and recovery, patching and employee education to fight attacks. These collaborative tools will protect networks from ransomware attacks.

Story image
Cloud breaches set to increase in velocity and scale - Accurics
“While the adoption of cloud native infrastructure such as containers, serverless, and servicemesh is fuelling innovation, misconfigurations are becoming commonplace and creating serious risk exposure for organisations."More
Download image
NFV adoption surges as firms seek to reduce network complexity
IT infrastructure has become more complex than ever, especially when it comes to networking and the reality of highly distributed infrastructures. That’s why many enterprises are turning to network functions virtualisation (NFV).More
Download image
How to leverage both hardware and software in authentication
When it comes to authentication solutions, pros and cons abound. A Crypto-of-Things solution delivers a strong security guarantee - without compromise.More
Story image
Why answering the question of orchestration vs automation will improve your security effectiveness
Organisations are looking to improve their security operations effectiveness, efficiency, and staff satisfaction, with security, orchestration, automation and response (SOAR) fast becoming a trending approach. More
Story image
How to stop your data lake from turning into a data swamp
Collecting data is easy – it’s gleaning the intelligence that’s the difficult part. More
Story image
Just 6,000 accounts responsible for over 100,000 email attacks - report
Barracuda has today released a report detailing how 6,170 malicious accounts that use Gmail, AOL, and other email services were responsible for more than 100,000 business email compromise (BEC) attacks on nearly 6,600 organisations. More