don’t get locked up by ransomware · ransomware protection for $25 or so, a good antivirus...

1
Don’t Get Locked Up by Ransomware AN INDIVIDUAL IS ATTACKED: JANUARY: Malware Distribution by Type A BUSINESS IS ATTACKED: S y s t e m L o c k d o w n S y s t e m L o c k d o w n S y s t e m L o c k d o w n DEFENDING AGAINST RANSOMWARE DON’T PAY THE RANSOM Increasingly, even if the ransom is paid, files are not unlocked as the criminal campaigns are too large and uncoordinated for criminals to track victim payments. DON’T OPEN SUSPICIOUS EMAILS You get lots of spam, and it’s difficult to tell which is harmless and which isn’t. That said, do not click on suspicious links or open attachments unless they’re from a trusted source. UPDATE SOFTWARE WannaCry and other ransomware code look for known vulnerabilities. Yes, it is inconvenient to patch or update software, but with the newer types of attacks, this will likely protect you more effectively. RANSOMWARE PROTECTION For $25 or so, a good antivirus solution will prevent the vast majority of ransomware attacks. Go to PCmag.com and search ransomware protection. BACK-UP YOUR DATA Again, like patching, this is tedious, but automated tools that back-up and secure your data in the cloud may be a lifesaver. every 20 seconds JUNE: every 10 seconds JANUARY: every 2 minutes JUNE: every 40 seconds Cryptolocker, Cryptowall, Petya, NotPetya, Locky and WannaCry have become notorious families of malware known as ransomware. Ransomware attacks have exploded since they came on the scene in 2012. The number of ransomware attacks on businesses tripled last year, jumping from one attack every two minutes at the beginning of the year to one every 40 seconds by the middle of the year. This year, 60% of malware payloads have been ransomware, with the rest being a mix of ad fraud malware and small traces of everything else. In recent years, malware distribution breakdowns like these have been heavily influenced by whatever it is the major botnets are distributing. The rise of the ransomware-as-a-service model has been a big factor, making it easier than ever for even novice cyber-criminals with the most basic technical knowledge to launch their own customized attacks. While there is a variety of ways malware can enter a network, ransomware was typically spread through phishing tactics. When users clicked on malicious links in an email or were sent to an infected website, the malware was installed, and locked their data. The WannaCry ransomworm changed the delivery method by eliminating user action to install the malware remotely and in an automated fashion by pinging systems to find those with known, unpatched vulnerabilities that would allow the attackers to install the malware. How a ransomware attack infects your systems: 1 in 4 businesses hit with ransomware have 1,000 employees or more. 22% of victims had to halt operations. No surprises here. Even when you have backups, a successful ransomware infection can grind your operations to a halt. And the longer you stay down, the harder (and more costly) it is to recover. $6 trillion in losses expected by 2021. Ransomware and other cybercrime are projected to cost the global economy $6 trillion per year by 2021. For perspective, that’s 7.5% of the total value of the global economy! 71% of companies targeted by ransomware attacks have been infected. Other AdFraud Botnet Banker Backdoor Downloader Ransomware 10% 0% 20% 30% 40% 50% 60% 70% Victim clicks on a malicious link or executable from an email and within minutes the malware locks all files on the system Malware spreads through the network by collecting email addresses and credentials to move from system to system Locked or encrypted files cannot be accessed without a decryption key from the attacker or from a vendor that has cracked the encryption and is offering the tool Exploitation/Infection Infection Infection 1 1 1 1 1 2 2 2 3 3 3 Web server Web filter Email filter Endpoint Endpoint 1 2 3

Upload: others

Post on 28-Sep-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Don’t Get Locked Up by Ransomware · RANSOMWARE PROTECTION For $25 or so, a good antivirus solution will prevent the vast majority of ransomware attacks. Go to PCmag.com and search

Don’t Get Locked Upby Ransomware

AN INDIVIDUAL IS ATTACKED:

JANUARY:

Malware Distribution by Type

A BUSINESS IS ATTACKED:Syste

m Lockdow

n

System Lo

ckdown

System Lo

ckdown

DEFENDING AGAINST RANSOMWARE

DON’T PAY THE RANSOMIncreasingly, even if the ransom is paid, files are notunlocked as the criminal campaigns are too large anduncoordinated for criminals to track victim payments.

DON’T OPEN SUSPICIOUS EMAILSYou get lots of spam, and it’s difficult to tell which isharmless and which isn’t. That said, do not click onsuspicious links or open attachments unless they’refrom a trusted source.

UPDATE SOFTWAREWannaCry and other ransomware code look for knownvulnerabilities. Yes, it is inconvenient to patch or updatesoftware, but with the newer types of attacks, this willlikely protect you more effectively.

RANSOMWARE PROTECTIONFor $25 or so, a good antivirus solution will prevent thevast majority of ransomware attacks. Go to PCmag.com andsearch ransomware protection.

BACK-UP YOUR DATAAgain, like patching, this is tedious, but automatedtools that back-up and secure your data in the cloudmay be a lifesaver.

every 20 seconds

JUNE:every 10 seconds

JANUARY:every 2 minutes

JUNE:every 40 seconds

Cryptolocker, Cryptowall, Petya, NotPetya, Locky and WannaCry have becomenotorious families of malware known as ransomware. Ransomware attacks have

exploded since they came on the scene in 2012. The number of ransomware attackson businesses tripled last year, jumping from one attack every two minutes at the

beginning of the year to one every 40 seconds by the middle of the year.

This year, 60% of malware payloads have been ransomware, with the restbeing a mix of ad fraud malware and small traces of everything else. In recent

years, malware distribution breakdowns like these have been heavilyinfluenced by whatever it is the major botnets are distributing.

The rise of the ransomware-as-a-service model has been a big factor, making iteasier than ever for even novice cyber-criminals with the most basic technical

knowledge to launch their own customized attacks.

While there is a variety of ways malware can enter a network, ransomware wastypically spread through phishing tactics. When users clicked on malicious

links in an email or were sent to an infected website, the malware wasinstalled, and locked their data.

The WannaCry ransomworm changed the delivery method by eliminating useraction to install the malware remotely and in an automated fashion by

pinging systems to find those with known, unpatched vulnerabilities thatwould allow the attackers to install the malware.

How a ransomware attack infects your systems:

1 in 4 businesses hit with ransomware have 1,000

employees or more.

22% of victims had tohalt operations.

No surprises here. Even when youhave backups, a successful

ransomware infection can grindyour operations to a halt. Andthe longer you stay down, the

harder (and more costly) it is to recover.

$6 trillion in lossesexpected by 2021.

Ransomware and other cybercrimeare projected to cost the global

economy $6 trillion per yearby 2021.

For perspective, that’s 7.5% of thetotal value of the global economy!

71% of companies targetedby ransomware attacks

have been infected.

Other

AdFraud

Botnet

Banker

Backdoor

Downloader

Ransomware

10%0% 20% 30% 40% 50% 60% 70%

Victim clicks on a malicious link or executable from anemail and within minutes the malware locks all files on the system

Malware spreads through the network by collecting email addressesand credentials to move from system to system

Locked or encrypted files cannot be accessed without a decryption keyfrom the attacker or from a vendor that has cracked the encryption andis offering the tool

Exploitation/Infection

Infection

Infection

1

1

1

1

1

22

2

3

3

3

Web server

Web filter

Emailfilter

Endpoint

Endpoint

1

2

3