Ransomware Archives - IT Security Guru https://www.itsecurityguru.org/tag/ransomware/ The Site for our Community Thu, 16 Mar 2023 10:10:49 +0000 en-US hourly 1 https://www.itsecurityguru.org/wp-content/uploads/2019/12/cropped-Guru_Transparent-PNG-1-32x32.png Ransomware Archives - IT Security Guru https://www.itsecurityguru.org/tag/ransomware/ 32 32 Rise of Ransomware Attacks Main Focus for SOCs, research finds https://www.itsecurityguru.org/2023/03/16/rise-of-ransomware-attacks-main-focus-for-socs-research-finds/?utm_source=rss&utm_medium=rss&utm_campaign=rise-of-ransomware-attacks-main-focus-for-socs-research-finds Thu, 16 Mar 2023 10:10:15 +0000 https://www.itsecurityguru.org/?p=47985 A new global study has looked into how SOC’s go about protecting organisations from threats, where they focus the most attention and what is driving modernisation plans. Cybereason’s latest report Ransomware and the Modern SOC: How Ransomware is Driving the Requirements for SOC Modernization, surveyed 1,203 security professionals from eight countries and a dozen industries, […]

The post Rise of Ransomware Attacks Main Focus for SOCs, research finds appeared first on IT Security Guru.

]]>
A new global study has looked into how SOC’s go about protecting organisations from threats, where they focus the most attention and what is driving modernisation plans.

Cybereason’s latest report Ransomware and the Modern SOC: How Ransomware is Driving the Requirements for SOC Modernization, surveyed 1,203 security professionals from eight countries and a dozen industries, and found more than 58% said their SOC spends most of its time responding to ransomware and supply chain attacks that often lead to ransomware incidents.

As a result, their modernization plans are now focused across four specific areas:

  • 38% — Plan to deploy new detection capabilities with better detection efficacy.
  • 31% — Need better visibility into the full attack story.
  • 31% — Are looking for ways to augment staffing and contract for managed services, and
  • 29% — Said ransomware has increased their need for better automation and faster response.

“In a post COVID world, the modern SOC needs to be a decentralized, capabilities-based organization that leverages industry-leading detection, prevention, visibility, and automation technologies, all of which are often augmented by managed services,” said Israel Barak CISO, Cybereason.

Travel and Transportation Industries Struggling

The study also revealed that almost a third (31%) stated the ransomware threat has exposed their need for better insight and visibility into the full attack story against their organisation. On average, 35 percent of respondents in the United States need better insight and visibility. In Italy, that number jumps to 46 percent. In the travel and transportation industry, more than 57 percent of respondents lack the proper level of threat attack visibility, followed by 39 percent of respondents in the retail, catering and leisure industries.

The post Rise of Ransomware Attacks Main Focus for SOCs, research finds appeared first on IT Security Guru.

]]>
UK second most targeted nation behind America for Ransomware https://www.itsecurityguru.org/2023/02/07/uk-second-most-targeted-nation-behind-america-for-ransomware/?utm_source=rss&utm_medium=rss&utm_campaign=uk-second-most-targeted-nation-behind-america-for-ransomware Tue, 07 Feb 2023 10:05:05 +0000 https://www.itsecurityguru.org/?p=47789 After closely monitoring the most active ransomware groups in 2022, the KrakenLabs team at Outpost24 are sharing their latest report that delves deep into the significant ransomware trends, threat groups, victim profiles, and motives behind these attacks from the past year. In total, the researchers identified 2,363 disclosed victims by various ransomware groups on Data Leak […]

The post UK second most targeted nation behind America for Ransomware appeared first on IT Security Guru.

]]>
After closely monitoring the most active ransomware groups in 2022, the KrakenLabs team at Outpost24 are sharing their latest report that delves deep into the significant ransomware trends, threat groups, victim profiles, and motives behind these attacks from the past year. In total, the researchers identified 2,363 disclosed victims by various ransomware groups on Data Leak Sites (DLS) in 2022.

Key facts from the report include:

  • Most active ransomware groups: Existing entities like LockBit, BlackCat, Hive, and Karakurt have demonstrated exponential growth and have surpassed previous records despite the disappearance of prominent threat groups such as CONTI and the old REvil

The total of victims per ransomware group during the year 2022

The total of victims per ransomware group during the year 2022 (Top 10)
  • Most attacked countries: From the 101 different countries that registered victims, 42% of them are from the United States. The UK second on the list followed by Canada, Germany, and France. In fact, 28% of victims were from Europe.

Top 20 countries with the highest number of victims

Top 20 countries with the highest number of victims
  • Worst offender: Last year, the ransomware group known as LockBit exhibited a significantly higher level of activity compared to other groups. They were responsible for 34% of all recorded attacks in 2022.
  • Sector most at risk: While critical infrastructure sectors accounted for just over half of the attacks perpetrated (51%), construction was the most targeted sector overall.

Breakdown of non-Critical sectors

Breakdown of non-Critical sectors that were most at risk

“The recent clampdown of Hive, following REvil, is a positive sign for all however organizations must ensure they keep their guards up against this constant evolving threat by prioritising cyber hygiene through regular vulnerability assessment, security testing and combining detection with threat intelligence to surface risk signals that can help prevent infection,” said Alejandro Villanueva, Threat Intel Analyst at Outpost24 and author of the report.
Further analysis by Outpost24 also revealed time periods in which the tables were turned, and ransomware groups were under DDOS (distributed denial of service) attack. In week 35 of 2022 LockBit group claimed that they were being attacked as a consequence of leaking stolen data from Entrust, a cybersecurity company that was attacked previously by them. Outpost24 KrakenLabs detected that not just LockBit, but many other ransomware DLSs were suffering DDOS attacks during this period. It is likely the attackers were aiming to cause disruption for the ransomware groups during the extortion process.

Ransomware groups suffering from DDOS

Ransomware groups suffering from DDOS in the last week of August 2022

To view the full report, click here

The post UK second most targeted nation behind America for Ransomware appeared first on IT Security Guru.

]]>
Gartner: 5 Considerations for I&O Leaders Planning Against Ransomware Attacks https://www.itsecurityguru.org/2022/12/07/gartner-5-considerations-for-io-leaders-planning-against-ransomware-attacks/?utm_source=rss&utm_medium=rss&utm_campaign=gartner-5-considerations-for-io-leaders-planning-against-ransomware-attacks Wed, 07 Dec 2022 17:21:35 +0000 https://www.itsecurityguru.org/?p=47455 Ransomware attacks are hitting organisations every day and infrastructure & operations (I&O) leaders are aggressively bolstering protection, detection and response capabilities against attacks. However, questions remain as to whether existing disaster recovery (DR) and business continuity plans are sufficient for ransomware recovery. To address this, I&O Leaders must consider five areas between the two recovery […]

The post Gartner: 5 Considerations for I&O Leaders Planning Against Ransomware Attacks appeared first on IT Security Guru.

]]>
Ransomware attacks are hitting organisations every day and infrastructure & operations (I&O) leaders are aggressively bolstering protection, detection and response capabilities against attacks.

However, questions remain as to whether existing disaster recovery (DR) and business continuity plans are sufficient for ransomware recovery.

To address this, I&O Leaders must consider five areas between the two recovery approaches, to better establish whether existing plans can withstand a potential ransomware attack.

  1. Similarities and Differences

Traditional DR and ransomware recovery have many similarities, including the need to coordinate with business continuity management, prioritise via recovery tiers and understand dependencies. Both also require procedures to assess the impact, declare and activate recovery plans, execute plans, and obtain clarity around access and maintenance.

However, ransomware recovery involves greater complexity and unpredictability and so it’s important to consider the business demand of the differing recovery steps in the process, which will naturally involve different stakeholders. These include varied recovery approaches, location, data loss, recovery time and the speed of a return to business as usual.

  1. Disaster Recovery Protects Against ‘Predictable’ Disasters

Traditional DR planning assumes that an entire location or application has failed, requiring failover to a DR location. These events can vary in scope, from regional power outages to IT equipment failure, and even natural disasters such as earthquakes, tornadoes and flooding, which destroy all infrastructure.

Planning for these events requires active or hot standby application infrastructure across data centres, which enables the failover to happen within a reasonable time, and with minimal or no data loss.

  1. Disaster Recovery Not Always Suitable for Ransomware Attacks

As of today, ransomware attacks are mostly well-planned where the attack can start weeks or months before the final ransomware assault. Typically, ransomware is only activated as the last step in a this well-prepared cyberattack, with attackers still having access during the attack.

Traditional DR usually relies on the replication and synchronisation of applications, data, and foundational network services between the primary site and the DR location. So, all the work the attackers do to compromise the production site will be replicated on the DR site. Consider that the contamination of the DR site will make it impossible to use standard recovery procedures after a cyberattack.

Contemplate that you may have to build from scratch in a worst-case situation and this will require planning to recover from alternative infrastructures, such as isolated recovery environments, cloud infrastructure, relocation sites and services.

  1. Disaster Recovery and Ransomware Recovery Follow Different Processes

Traditional DR activation follows a straightforward process where — after the disaster event is detected — an assessment is conducted to decide whether failover is required or not. After that, failover is executed and validated, and business continues. A well-planned failback (when applicable) can be executed when the primary environment is recovered.

Recovery from ransomware, on the other hand, requires multiple and more complex stages. In the first phase, there is a focus on stopping the attack from execution and propagation. In the second phase, forensic analysis is required to find out what happened, what ransomware was executed, the security issues at hand and how it infiltrated the infrastructure. During the third phase, analysis is required to find which network artefacts, apps, data and backups are affected.

Through phase four, there is a focus on the recovery of foundational infrastructure, by either a restore or a rebuild of all artefacts in the network, as well as storage and compute infrastructure, followed by a rebuild or recovery of network services like DNS and AD. In phase five, a dedicated isolated recovery environment (IRE) is leveraged to scan, repair, and validate operating and application/data systems to prepare for recovery back to the primary environment. Finally, in phase six, systems are migrated out of IRE back to production.

This level of impact on the entire infrastructure is what makes ransomware recovery so complex and unpredictable, as you need to first recover and resecure every impacted element in your infrastructure environment before you can recover systems, applications and their data. Examine the complexities that come along with the different processes and the demands this may ask of your organisation.

  1. Ransomware Recovery is a ‘Team Effort’

DR is often led by the DR team, which consists of the server team, network team, storage team, backup team, who all report to the DR manager, who then reports to the CIO. DR is part of the wider business continuity management process, where DR is responsible for the recovery of IT systems in a disaster situation.

Ransomware recovery, on the other hand, is initially led by the cybersecurity incident response team, which reports to the chief information security officer and is supported by other infrastructure and operations teams, including the DR team. Hence, recovery from a ransomware attack is far more of an all-enterprise effort and consider whether you have the resources to approach this appropriately.

Gartner analysts will further explore and compare disaster recovery and ransomware recovery at next year’s Gartner Security & Risk Management Summit 2023, taking place 26-28 September, in London, UK.

Jerry Rozeman is a Senior Director Analyst at Gartner

The post Gartner: 5 Considerations for I&O Leaders Planning Against Ransomware Attacks appeared first on IT Security Guru.

]]>
Seven Ransomware Predictions for 2018 https://www.itsecurityguru.org/2018/01/09/seven-ransomware-predictions-2018/?utm_source=rss&utm_medium=rss&utm_campaign=seven-ransomware-predictions-2018 Tue, 09 Jan 2018 17:02:07 +0000 http://www.itsecurityguru.org/?p=25014 It might surprise you to know that most ransomware victims choose to pay a ransom to have their data restored. As long as victims continue to pay up, ransomware will continue to be a go-to strategy for cybercriminals. Furthermore, Forrester Research predicts that cybercriminals will increasingly use ransomware in 2018 to monetise attacks, as end-to-end […]

The post Seven Ransomware Predictions for 2018 appeared first on IT Security Guru.

]]>
It might surprise you to know that most ransomware victims choose to pay a ransom to have their data restored. As long as victims continue to pay up, ransomware will continue to be a go-to strategy for cybercriminals. Furthermore, Forrester Research predicts that cybercriminals will increasingly use ransomware in 2018 to monetise attacks, as end-to-end encryption in payment systems often prevents them from stealing credit card data. In 2018, ransomware will be used as a backup method for when initial attacks fail. Adversaries will adopt a number of new strategies, which I will outline in this article. Interestingly, ransomware is also likely to be used to leave a false trail to conceal other attacks.

So here are our top seven predictions for this year. Ransomware will:

  1. Target Linux systems
  2. Become more targeted
  3. Exfiltrate data
  4. Be used as a smokescreen
  5. Be an attack of last resort
  6. Be used as a false flag
  7. Leverage social media

Last year, we observed attacks hitting MongoDB which suggest that ransomware will increasingly target Linux systems in 2018 in an effort to further extort larger enterprises. Overall, ransomware will become more targeted by looking for certain file types and targeting specific companies such as legal, healthcare, and tax preparers rather than the “spray and pray” attack we largely see now. There is already ransomware that targets databases, preying on businesses, and small tweaks to their code can target critical, proprietary files such as AutoCAD designs.

While most ransomware samples simply encrypt files in place and transmit encryption keys for the purpose of decryption, there will be ransomware samples that will take the extra step of exfiltrating data prior to encryption. Not only would such an evolution put stress on companies to restore their data but also incorporate the loss of proprietary data that could be sold on the black market. Ransomware will emerge as a secondary method when initial forms of attack fail. Adversaries that rely upon more crafted and targeted attacks may use ransomware as an attack of last resort.

Ransomware will increasingly leverage social media to spread either intentionally or unintentionally. Similar to malware such as Koobface, maliciously shared content on sites such as Facebook could lead victims to click enticing links. Attackers are known to use social engineering to influence people to unknowingly spread ransomware over the internet. Intentionally shared ransomware, seen in prior concepts, such as Popcorn Time, where victims could share to reduce or eliminate their ransom, could see larger-scale use.

In addition the greater sophistication of ransomware attacks that is inevitable in 2018, cybercriminals are likely to use ransomware as a way of throwing defenders off the scent. Ransomware will increasingly be used as a smokescreen. For example, in the past, Zeus botnet operators hit victims with DDoS attacks after an infection to take investigators off the trail. A similar trend is emerging with ransomware attacks where the encryption of files could take place after more damning actions are taken by adversaries. Using already existing techniques of deleting Volume Shadow Copies, which deletes potential file backups, and the deletion of Windows event logs, adversaries can thwart many incident response efforts by forcing responders to focus on decrypting files instead of investigating data and credentials exfiltrated.

Also, ransomware will be used more commonly as a false flag, as seen with NotPetya. Solely from dynamic analysis it was perceived to be Petya, when a more detailed review showed it wasn’t. Such quick analysis also insinuated it to be obvious ransomware, but a greater depth of disassembly showed that data was not held at ransom; it was simply destroyed.

Ransomware is now estimated to be a $5 billion crime, according to a Cybersecurity Ventures Report. In 2015, the estimate was a mere $24 million. In 2017, the industries most targeted were technology, government, non-profit and legal. However, no industry was, or is, immune. As attacks become more targeted and increasingly exploit the methods described above, having a strong defence system is more important than ever.

Therefore it is critical that anyone looking to combat ransomware chooses a defence system that has undergone a comprehensive ransomware test. To test their effectiveness, defence products should be tested against ransomware samples selected from multiple crypto-ransomware families collected in the wild.  For more information on non-malware attacks, ransomware and the evolving threat landscape in 2018, download Carbon Black’s 2017 Threat Report Carbon Black’s Threat Analysis Unit (TAU) has researched the current state of ransomware, malware and non-malware attacks with a particular focus on how frequently organisations are being targeted.

Written by Param Singh, Director of Threat Research, Carbon Black

 

The post Seven Ransomware Predictions for 2018 appeared first on IT Security Guru.

]]>
Five Arrested in Romania for Spreading CTB Locker and Cerber Ransomware https://www.itsecurityguru.org/2017/12/21/five-arrested-romania-spreading-ctb-locker-cerber-ransomware/?utm_source=rss&utm_medium=rss&utm_campaign=five-arrested-romania-spreading-ctb-locker-cerber-ransomware Thu, 21 Dec 2017 15:43:09 +0000 http://www.itsecurityguru.org/?p=24906 Five suspected hackers have been arrested in Romania, for allegedly distributing CTB Locker and Cerber Ransomware in the US and Europe. View Full Story  ORIGINAL SOURCE: IB Times

The post Five Arrested in Romania for Spreading CTB Locker and Cerber Ransomware appeared first on IT Security Guru.

]]>
Five suspected hackers have been arrested in Romania, for allegedly distributing CTB Locker and Cerber Ransomware in the US and Europe.
View Full Story 
ORIGINAL SOURCE: IB Times

The post Five Arrested in Romania for Spreading CTB Locker and Cerber Ransomware appeared first on IT Security Guru.

]]>
Corporate Cyber Insurance Will Fuel Ransomware Growth in 2018 says WatchGuard https://www.itsecurityguru.org/2017/12/11/corporate-cyber-insurance-will-fuel-ransomware-growth-2018-says-watchguard/?utm_source=rss&utm_medium=rss&utm_campaign=corporate-cyber-insurance-will-fuel-ransomware-growth-2018-says-watchguard Mon, 11 Dec 2017 16:46:07 +0000 http://www.itsecurityguru.org/?p=24830 While the increasing number of publicly disclosed breaches and successful ransomware incidents are driving growth in cyber insurance, there is a risk that this will encourage criminals to target companies with extortion insurance to demand increased payments, believes researchers at WatchGuard Technologies. In countries that require mandatory breach disclosure, cyber insurance helps cover the costs […]

The post Corporate Cyber Insurance Will Fuel Ransomware Growth in 2018 says WatchGuard appeared first on IT Security Guru.

]]>
While the increasing number of publicly disclosed breaches and successful ransomware incidents are driving growth in cyber insurance, there is a risk that this will encourage criminals to target companies with extortion insurance to demand increased payments, believes researchers at WatchGuard Technologies.
In countries that require mandatory breach disclosure, cyber insurance helps cover the costs and sometimes the lawsuits that result from these breaches. But more recently, insurers have promoted optional extortion insurance packages that cover the costs of ransomware and other cyber extortion payments.
“We find it concerning that insurers sometimes pay ransoms to recover their customers’ data,” says Corey Nachreiner, CTO at WatchGuard Technologies. “While we understand the business decision, insurers currently have no long-term actuarial data for cyber incidents and ransomware. It is possible that paying ransoms will encourage this criminal business model and increase the number of incidents insurers have to handle or the cost of ransoms.”
As most studies show that at least one-third of ransomware victims already pay, smart ransomware authors will target insurers to identify organisations with extortion insurance, and then attack them directly.
“We expect SMBs to continue to adopt extortion insurance in 2018 but cyber insurance should not replace security controls and best practices,” says Nachreiner. “We predict that insurance providers will start to implement guidelines that require companies to have strong security controls in place as a prerequisite. When combined with other layers of security, cyber insurance is a great addition to your cyber security strategy.”
See the WatchGuard predictions videos at:  https://www.watchguard.com/wgrd-resource-center/2018-security-predictions

The post Corporate Cyber Insurance Will Fuel Ransomware Growth in 2018 says WatchGuard appeared first on IT Security Guru.

]]>
Mecklenburg County held to Ransom https://www.itsecurityguru.org/2017/12/07/mecklenburg-county-held-ransom/?utm_source=rss&utm_medium=rss&utm_campaign=mecklenburg-county-held-ransom Thu, 07 Dec 2017 14:08:37 +0000 http://www.itsecurityguru.org/?p=24807 Mecklenburg, North Carolina’s more populous metro areas, came to a halt as a cyberattack froze data on dozens of the countys servers. Attackers are asking for $23,000 payment. Read Full Story  ORIGINAL SOURCE: Daily Mail

The post Mecklenburg County held to Ransom appeared first on IT Security Guru.

]]>
Mecklenburg, North Carolina’s more populous metro areas, came to a halt as a cyberattack froze data on dozens of the countys servers. Attackers are asking for $23,000 payment.
Read Full Story 
ORIGINAL SOURCE: Daily Mail

The post Mecklenburg County held to Ransom appeared first on IT Security Guru.

]]>
How businesses can unwittingly become launch-pads for malware attacks on clients and partners https://www.itsecurityguru.org/2017/11/22/businesses-can-unwittingly-become-launch-pads-malware-attacks-clients-partners/?utm_source=rss&utm_medium=rss&utm_campaign=businesses-can-unwittingly-become-launch-pads-malware-attacks-clients-partners Wed, 22 Nov 2017 14:01:02 +0000 http://www.itsecurityguru.org/?p=24677 In business, reputation is everything. So it is not hard to imagine the conversations that took place inside two law firms when they realised they had potentially become malware hubs spreading malicious code among clients and business-partners. The legal ramifications could have been catastrophic. In the first incident, the PDFs created in the firm were […]

The post How businesses can unwittingly become launch-pads for malware attacks on clients and partners appeared first on IT Security Guru.

]]>
In business, reputation is everything. So it is not hard to imagine the conversations that took place inside two law firms when they realised they had potentially become malware hubs spreading malicious code among clients and business-partners. The legal ramifications could have been catastrophic.
In the first incident, the PDFs created in the firm were found to contain code for which there was no explanation, while at the second, the document scanner was discovered to be incorporating unauthorised code into the structure of digital files it was generating. The incidents, although entirely separate, both involved pieces of code that could have been triggers for a massive cyber-attack on anyone receiving the documents as email attachments.
This was just what these firms did not need when they send out thousands of attachments every week. There was a strong possibility that their companies had been penetrated by cyber criminals and were in danger of taking their entire supply chains down with them.
It was only because both firms sent files to Glasswall, which provides file-regeneration technology (also known as Content Disarm & Reconstruction), that these pieces of code were detected.  Since this technology examines files down to byte-level against the ISO or manufacturers’ standards before they are dispatched, the unexpected and potentially malicious code was quickly picked up.
Had they been deploying traditional anti-virus technology, what might have been code waiting to initiate a zero-day attack could have gone undetected for months, infecting more and more organisations or waiting to go off like a time-bomb when the criminals found the specific target they were looking for.
However, the code was found to be anomalous and the firms were able to sigh with relief. Instead of having their reputations vaporised, they only had to investigate flaws in the software responsible, a product used on a daily basis by all staff.
The detection of these code anomalies is a definite illustration of how cyber risk will start to move much more heavily into the supply chain. Criminals are fully aware that any major organisation they want to target is only as safe as its least secure supplier, which they can use as a backdoor means of illegal entry.
As such threats emerge, we are increasingly going to see malware in writers, in computer hardware and in the chip sets that power them. The UK government must surely be concerned that a leading UK chip-maker such as Imagination Technologies is now in the hands of Chinese state-backed private equity investors Canyon Bridge, who were barred by US President Donald Trump from buying an American rival because of security sensitivities.
 
A stern warning about relying on traditional methods
In fact the detection of these code anomalies by Glasswall should act as a warning to every business. There can hardly be a company that does not use email attachments throughout the working day and it is the structures of these common file-types such as PDFs that are increasingly used as vectors by criminals spreading malware. More than 90 per cent of successful cyber-attacks commence when someone unknowingly opens a common attachment such as a PDF, Word, PowerPoint or Excel file that has been subtly altered to act as a malware trigger.
Unrecognised by the anti-virus industry’s gatekeepers, these pieces of malicious code are also able to trick their way through sandboxing applications. The constantly evolving sophistication of such exploits leaves organisations hopelessly vulnerable if they rely on a combination of anti-virus solutions and encryption to maintain security. The threats within JavaScript, Flash, encrypted and embedded files may be well-known, yet the biggest sources of danger are inside the structures of common files such as PDFs, Excel and Word.
Research into PDF-borne malware by Glasswall has shown, for example, that in many organisations as little as 1.5 per cent of PDF files contain JavaScript. This means a remarkable 98.5 per cent of known PDF malware files were hiding payloads outside this well-known vector.
Aware of the danger of sending out infected documents, many businesses, especially in the professional sector, also rely on encryption to protect their business partners. Sadly this is mistaken. Encryption may protect a message’s contents from being intercepted and opened up by a third-party, but it will achieve little more than deliver infected files successfully.
 
Get your security down to byte-level
The only certain defence against these threats is file-regeneration which will conduct minute examinations of each document in fractions of second, generating a clean and sanitised version that can be used in total safety. With PDFs, the technology has detected a change of just two bytes which criminals hid inside the file structure in order to crash the recipient’s reader so that malicious code would trigger a malware attack.
Once files have been sanitised, outbound email attachments can be sent in full confidence, having been cleared of all malicious code. The intelligence derived from this technology also gives organisations vital insights into the nature of the threats they are facing and how criminals are adapting code or shifting vectors.
In a recent 30-day period, for example, almost three-quarters of all the threats eliminated through file-regeneration were zero-day attacks that would have been completely missed by standard anti-virus technology because they had not previously been assigned an identifying “signature”.
In the absence of Content Disarm & Reconstruction, organisations risk becoming the proxy malware hubs of criminals, facing potentially huge legal liabilities and the destruction of all reputation, which in modern business is equivalent to a death warrant. The only certain defence against this grizzly fate is innovation in the shape of file-regeneration.

The post How businesses can unwittingly become launch-pads for malware attacks on clients and partners appeared first on IT Security Guru.

]]>
59% of Employees who are Ransomware Victims Pay Ransom From Own Pocket's https://www.itsecurityguru.org/2017/11/02/59-employees-ransomware-victims-pay-ransom-pockets/?utm_source=rss&utm_medium=rss&utm_campaign=59-employees-ransomware-victims-pay-ransom-pockets Thu, 02 Nov 2017 11:04:30 +0000 http://www.itsecurityguru.org/?p=24446 A survey of over 1000 office workers has revealed that over 59% of office workers hit by ransomware have paid the ransom themselves, out of their own pocket. Read Full Story  ORIGINAL SOURCE: Bleeping Computer

The post 59% of Employees who are Ransomware Victims Pay Ransom From Own Pocket's appeared first on IT Security Guru.

]]>
A survey of over 1000 office workers has revealed that over 59% of office workers hit by ransomware have paid the ransom themselves, out of their own pocket.
Read Full Story 
ORIGINAL SOURCE: Bleeping Computer

The post 59% of Employees who are Ransomware Victims Pay Ransom From Own Pocket's appeared first on IT Security Guru.

]]>
Bad Rabbit in the Works since 2016 https://www.itsecurityguru.org/2017/10/26/bad-rabbit-works-since-2016/?utm_source=rss&utm_medium=rss&utm_campaign=bad-rabbit-works-since-2016 Thu, 26 Oct 2017 10:09:28 +0000 http://www.itsecurityguru.org/?p=24357 Attackers behind this week’s Bad Rabbit campaign had compromised some of the websites used to spread the ransomware as far back as 2016, according to new research. Read Full Story  ORIGINAL SOURCE: Info Security Magazine

The post Bad Rabbit in the Works since 2016 appeared first on IT Security Guru.

]]>
Attackers behind this week’s Bad Rabbit campaign had compromised some of the websites used to spread the ransomware as far back as 2016, according to new research.
Read Full Story 
ORIGINAL SOURCE: Info Security Magazine

The post Bad Rabbit in the Works since 2016 appeared first on IT Security Guru.

]]>