stevenmbrun
Ransomware, Phishing and APTs Avoid Falling Victim to These Attacks
These days its rare to read the news and for there not to be an article about some sort of security breach. Ransomware and phishing (in its various forms) have been around for years they arent exactly new news. So why are they making headlines?
In short its about big money, bold attacks, and the ability to evade the law. In 2016, the FBI estimates that $2.3 billion have been extorted from CEOs in email scams. Additionally, IDG estimates that 93% of phishing emails are ransomwaremdash and we are barely even scratching the surface. It doesnt matter how you look at it; if youre anything like me, youll be left wondering when its your turn.
Its no longer about a wayward teenager in a basement somewhere planning these attacks hacking has become organized crime with a viable and lucrative business model. Its so sophisticated that some of these organizations are behaving like corporate entities. They have HR departments, specialist recruiting arms, and help desks that will educate you on Bitcoin, as well as how to make a quick, yet painful ransom payment so that you can get back your files.
These organizations are now as much about psychology as they are proven hacking techniques. They are all but inserting themselves into your lives. They go to great lengths to patiently watch and learn as much as they can about you: your online life, your professional life, your family and friends; lives, where you were at a specific time and with whom. Creepy isnt it?
And then, when they have enough information and the right circumstances, they strike! High-value targets like CEOs and CFOs are preferred, but the statistics show that they really dont discriminate. They dont care if you can or cannot afford to pay a ransom fee. In fighting terms, they are attacking the soft tissues that make up both your online and real life presence. They can easily gather this information from various places online, such as social networks, application, where we often let down our guards and share just enough personal information to help a criminal create a very convincing attack. These attackers know that a bit of social engineering is much easier than hacking an organization.
Technology to counter these threats continues to quickly improve. Modern application, firewalls and security gateways are connected to (near) real-time databases that are updated constantly with the latest threats. These distributed neural-type networks are proving to be highly effective; however, they are only as good as the latest threat. Firewalls are only okay if youre on the right side of one. Even antispam technology reaching 99% effectiveness leaves a large gap as the volumes continue to rise. Add in our increasingly mobile lives, and its a land-grab for todays attackers. We use numerous devices mobile phones, tablets, laptops to access data any time, any where. We store increasing amounts of data in multiple clouds with little thought given to the security of that data documents in your app, personal photos on iCloud, family updates on personal blogs on WordPress, business plans stored on Dropbox, credit cards stored on Amazon, and the list goes on. The truth is, we make it very easy for attackers to compile profiles on us and these profiles can then be used for nefarious purposes like stealing our identities or emptying our bank accounts. Put all of this into a business context, and CISOs and network managers are left scrambling to find solutions that protect both corporate data and employees.
For more information on ransomware, follow our site https://apps.apple.com/us/app/scanner-app-scan-pdf-docs-id/id1495971405 series. For more on Ransomware solutions that can help protect you from attacks like Locky, visit these product blog.
Get more:
Android on BlackBerry?
ShopSavvy Logo Evolution