WannaCry Anniversary and the current state of Ransomware

Check Point Software Technologies Ltd, a provider of cyber security solutions, describes in detail its evolution ransomware in recent years, since its perpetrators WannaCry they were asking for just a few hundred dollars from their victims until Accounts which required tens of millions.

hacker code

Η Check Point also reveals that global attacks ransomware rose by 14% on an annual basis and states that organizations must prioritize prevention if they are ever to combat this growing threat.

Η attack WannaCry 2017 was the first of its kind - a global, state-funded, multidisciplinary offensive. Despite this, the original claim involved extortion at a cost of just $ 300.

Although it is WannaCry therefore, it was not a pioneer in terms of profitability, it was certainly in the sense that it marked the beginning of its political use ransomware. For the past five years, businesses ransomware have been moved from random emails to multimillion-dollar businesses such as NotPetya, REvil, Accounts and DarkSide, which carry out targeted and sophisticated attacks that affect organizations in every industry. The ransom demand faced by Kaseya by 2021 it is said to have been $ 70 million.

The rise of double and triple blackmail

Remote and hybrid work, along with its accelerated adoption cloud, have opened up new opportunities for exploiters by ransomware. These attacks are becoming more and more sophisticated with new trends such as This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Ransomware-as-a-Services, The double, even ο triple blackmail. Cybercriminals threaten double blackmail to publish private information of the infected organism - their immediate victim, but also demand ransom not only from him but also from his customers, associates and suppliers in triple blackmail.

Attacks on governments and critical infrastructure

A few days ago, two mass attacks took place ransomware in Costa Rica and the Peru, who were allegedly executed by the infamous gang Conti ransomware.

The attacks led the Costa Rican government to declare a state of emergency on May 6 and estimate $ 200 million in losses by paralyzing customs and government services, and even resulting in a power outage in one of the country's cities due to of offending a major energy supplier.

One of the most prominent attacks ransomware in critical infrastructure in recent years she was on the pipeline Colonial pipeline.

  FLocker ransomware that locks Smart TVs

Every business is a goal

While governments and big companies are often on the front pages of newspapers, the perpetrators ransomware do not discriminate and target companies of all sizes in all areas.

To protect themselves, IT teams must prioritize prevention. They should be vigilant for any indications of one trojan in their networks, to regularly update the anti-virus software, to prevent the relevant vulnerabilities RDP (Remote Desktop Protocol) and use two-factor authentication.

In addition, organizations should develop specific solutions against it ransomware, which constantly monitor for behaviors related to ransomware and detect illegal file encryption so that an infection can be prevented and quarantined before it can be scaled up. With these protections in place, organizations can be better prepared for when they will be attacked, as it is now a matter of when and not if it happens to them.

On the occasion of the fifth anniversary of the attack WannaCryThe Check Point created one on the Ransomware hub, which includes exhibitions, blogs, webinars, podcasts, videos and live statistics on attacks ransomware and their impact.

Registration in iGuRu.gr via email

Your email for sending each new post

Follow us on Google News iGuRu.gr at Google news

Leave a reply

Your email address Will not be published.

  + 24 = 32

Previous Story

A door was found on the planet Mars

Next Story

IP TV Player free Greek and foreign channels