Blog

New Developments in Ransomware are Potentially Devastating

New Developments in Ransomware are Potentially Devastating

While it only makes sense to assume that a cybercriminal would focus specifically on those targets that would bring them the greatest profit—in other words, larger businesses—the reality of modern cybercrime renders this assumption grossly outdated. Let’s examine how different developments in ransomware have made it possible for cybercriminals to be far less discerning in who they target.

In No Uncertain Terms, Ransomware Has Grown More Dangerous

Let’s face facts for a moment: in order to be effective, a cybercriminal can take advantage of a few different challenges that small and medium-sized businesses frequently struggle with. For instance:

  • Cybercriminals frequently rely on deception in the form of phishing. Using phishing attacks, a cybercriminal bypasses the protections a business has in place by taking advantage of their employees in order to gain access to the business’ network.
  • A lack of communication between departments makes issues even greater. A lack of communications between a business’ departments can exacerbate the risks to be seen from cybercriminals.
  • Smaller businesses don’t always have the resources needed to prepare their team members. Unlike corporations, SMBs likely don’t have a dedicated budget for cybersecurity training, and almost certainly can’t afford the salary of a dedicated security professional on-staff.

On top of these opportunities, however, today’s cybercriminal has others they can exploit:

Automated Threats

Cybercriminals, like many of the businesses operating today, have embraced the concept of automation to their advantage. Rather than manually attacking individual targets, cybercriminals are able to wage widespread attacks with minimal effort. Even the extortion component of ransomware has become increasingly automated.

One ransomware variant, Avaddon, has been using automation to its advantage. With a Dark Web site listing the companies that have been infected, a countdown is provided that ticks away the time before data is automatically publicized.

Ransomware as a Service

Cybercrime is now a legitimate industry (in a manner of speaking), with teams of developers and commission-based structures responsible for spreading attacks far and wide. Ransomware as a Service is just one example of this, with a packaged ransomware attack bundled up for an aspiring cybercriminal to use. These kinds of services only make cyberattacks more accessible to those who would wage them.

Layered Extortion

Many ransomware attacks have historically extorted money from their victims more than once. Not only are the victims charged for resumed access to their data, but they then have to pay up to keep the attackers from leaking this data out.

Unfortunately for businesses, this approach has evolved. Now, this kind of extortion takes place in four parts:

  • The victimized business is instructed to pay for their access to their encrypted data to be restored.
  • Hackers release the data they’ve stolen if the ransom isn’t paid.
  • Denial of Service attacks are used to take down a victim’s website.
  • The cybercriminals responsible reach out to the targeted business’ customers, partners, employees, and the media to inform them of the hack.

All in all, these tactics have only made ransomware attacks more successful.

You Need to Be Ready to Resist Ransomware

Ransomware is a serious issue for businesses, and isn’t going away anytime soon. That’s why we’re here to help you stop it. Find out more about what we can do by calling 603-889-0800 today.

By accepting you will be accessing a service provided by a third-party external to https://www.whitemtn.com/

Related Posts

Cybersecurity has changed considerably since 2017, and any business that wants to survive in the evolving online environment needs to consider how they are protecting their assets. We want to take a look at precisely how cybersecurity has changed sin...
Security is one of the most important parts of running a business, especially today when organizations rely so heavily on their technology solutions. Some of the most dangerous threats lurk on a business’s network, watching and waiting for an opportu...
Cybersecurity is one of the most talked about problems facing the modern business. This is because cybercrime has increased precipitously while businesses have moved more of their processes onto the computer. Planning how to protect your business’ cr...
We always picture hackers as these foreboding, black-clad criminals, smirking through the shadows cast in their dark room by their computer monitor. Hardened, uncaring individuals who don’t go outside very often, staring at code as if they were able ...
Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security c...
Databases are exceptionally useful for allowing access to important data, but they by default expose data to risks depending on how they are stored. If a database is stored in the cloud, for example, it could potentially be exposed to threats that pu...
Security has never been easy for any business that deals with sensitive information. Nowadays, even a small business that uses an Internet connection has to worry about hackers and malware of all types. This is especially problematic for small health...
The online world is a scary place. Viruses, malware, spyware, adware, and more are all out there trying to get at your network. These threats are almost always prevalent, but compared to each other, some are vastly superior and far more dangerous and...
It doesn’t matter if you are a small locally-owned business or a larger-scale enterprise. Network security is equally important, as all businesses by default collect valuable information for hackers. It makes sense to protect your valuable assets, an...
One minute you’re browsing trusted sites on the Internet, the next, your PC freezes up and displays the dreaded blue screen of death, along with a fake tech support message. This strain of malware is duping plenty of computer users into calling the p...
While security experts tend to focus the brunt of their discussions on desktop OS vulnerabilities, there are plenty of mobile malware threats that fly under the radar. One such malware is called Hummer; a trojan that installs unwanted apps and malwar...
Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, t...

Onsite Service Coverage Area

Although we provide remote services and support to businesses in over 20 states, onsite services are limited to within reasonable driving distance from our office in NH.  We will manage a local vendor for locations outside of our service area to provide onsite assistance when needed.

 

Onsite Computer Support Services are available to businesses within 100 miles of Nashua New Hampshire. We have excellent onsite coverage from Concord NH, south through Manchester NH, and then down into Boston. From Northern and Central Mass, we cover from Worcester, east to the North Shore, including the Salem and Portsmouth NH area.

 

White Mountain IT Services
33 Main Street, Suite 302
Nashua, New Hampshire 03064

 

603-889-0800

map nashua4 1

 

Open Positions