sb-as logo
Story image

Ransomware attacks are getting easier, but protection is getting harder

22 Sep 2016

Ransomware is continuing to be an ever-popular and effective method for cyber attacks, and Trend Micro says it's only being made easier with do-it-yourself ransomware kits that are being sold in the deep web.

Stampado is just one of those tools, selling for US$39 that allowed even the most non-technical of would-be attackers to mount a ransomware operation. Ransomware as a Service, or RaaS, relies on internet browsing, spam and outdated software to launch attacks, and from there it's a messy story.

The company says that CryptoWall gained US$325 million from victims, and other ransomware operates in much the same way. Files are encrypted, and hackers make their demands.

Ransomware families have experience a 172% increase in families in the first half of 2016 - higher than what was found in the entire year of 2015.

The company says that for organisations, the effects can vary depending on what data they want to protect. While an attacker doesn't know the importance of a file, blanket attacks on folders, servers and drives allow the hackers to at least gain a few victims.

Organisations affected by those blanket attacks can experience everything from lost sales, unfulfilled orders, productivity losses and critical files. The result can be damaging for not only the company, but its brand and consumer perception.

There is no end or cure in sight for the ransomware threat, as the company states from research that it will only get more complex, evasive and intrusive with time.

While Trend Micro says that there is no cure for ransomware, organisations can use multilayered protection, data backup and recovery, patching and employee education to fight attacks. These collaborative tools will protect networks from ransomware attacks.

Story image
Pandemic sees organisations of all sizes and industries invest in CTI
There is opportunity for organisations to better manage their cyber-threat intelligence for greater security and threat intelligence effectiveness by adopting the right tools and processes.More
Story image
Cybersecurity budgets still not keeping up with threats — report
Executive teams are failing to recognise the level of damage cyber-threats pose to organisations, according to Sophos — many of them taking a ‘conservative approach’ to cybersecurity expenditure.More
Story image
Need for greater understanding of data security responsibility as cloud adoption grows - report
Despite the accelerated adoption of cloud services, there was a lack of clarity and confidence regarding the protection and recovery of data stored in public clouds.More
Story image
ABB and Nozomi Networks extend collaboration, deliver improved OT security solutions
"With Nozomi Networks solutions added to our cybersecurity portfolio, our customers gain proven network monitoring and threat detection technology."More
Story image
Zscaler and CrowdStrike release integrations for end-to-end security
This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications.More
Story image
Five things ANZ businesses should know about storing customers’ data
Businesses need to correlate events intelligently across multiple threat surfaces, application layers, and time spans to connect event A, to event B, to event C — even if they are months apart.More