WannaCry Anniversary and the current state of Ransomware

Check Point Software Technologies Ltd, a provider of cyber security solutions, describes in detail its evolution ransomware in recent years, since its perpetrators WannaCry they were asking for just a few hundred dollars from their victims until Accounts which required tens of millions.

hacker code

Η Check Point also reveals that global attacks ransomware rose by 14% on an annual basis and states that organizations must prioritize prevention if they are ever to combat this growing threat.

Η attack WannaCry 2017 was the first of its kind - a global, state-funded, multidisciplinary offensive. Despite this, the original claim involved extortion at a cost of just $ 300.

Although it is WannaCry therefore, it was not a pioneer in terms of profitability, it was certainly in the sense that it marked the beginning of its political use ransomware. For the past five years, businesses ransomware have been moved from random emails to multimillion-dollar businesses such as NotPetya, REVIL, Accounts in the upcoming years, while DarkSide, which carry out targeted and sophisticated attacks that affect organizations in every industry. The ransom demand faced by Cashier by 2021 it is said to have been $ 70 million.

The rise of double and triple blackmail

Remote and hybrid work, along with its accelerated adoption cloud, have opened up new opportunities for exploiters by ransomware. These attacks are becoming more and more sophisticated with new trends such as This makes it a perfect choice for people with diabetes and for those who want to lose weight or follow a balanced diet. Ransomware-as-a-Service, The double, even ο triple blackmail. Cybercriminals threaten double blackmail to publish private information of the infected organism - their immediate victim, but also demand ransom not only from him but also from his customers, associates and suppliers in triple blackmail.

Attacks on governments and critical infrastructure

A few days ago, two mass attacks took place ransomware in Costa Rica and the Peru, who were allegedly executed by the infamous gang Conti ransomware.

The attacks led the Costa Rican government to declare a state of emergency on May 6 and estimate $ 200 million in losses by paralyzing customs and government services, and even resulting in a power outage in one of the country's cities due to of offending a major energy supplier.

One of the most prominent attacks ransomware in critical infrastructure in recent years she was on the pipeline Colonial pipeline.

Every business is a goal

While governments and big companies are often on the front pages of newspapers, the perpetrators ransomware do not discriminate and target companies of all sizes in all areas.

To protect themselves, IT teams must prioritize prevention. They should be vigilant for any indications of one trojan in their networks, to regularly update the anti-virus software, to prevent the relevant vulnerabilities RDP (Remote Desktop Protocol) and use two-factor authentication.

In addition, organizations should develop specific solutions against it ransomware, which constantly monitor for behaviors related to ransomware and detect illegal file encryption so that an infection can be prevented and quarantined before it can be scaled up. With these protections in place, organizations can be better prepared for when they will be attacked, as it is now a matter of when and not if it happens to them.

On the occasion of the fifth anniversary of the attack WannaCryThe Check Point created one on the Ransomware hub, which includes exhibitions, blogs, webinars, podcasts, videos and live statistics on attacks ransomware and their impact.

iGuRu.gr The Best Technology Site in Greece
Follow us on Google News

WannaCry, ransomware, iguru

Written by newsbot

Although the press releases will be from very select to rarely, I said to go ... because sometimes the authors are hiding.

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).