Ransomware Hackers Are Getting More Advanced

Hackers using software to block data and then demand money in return are relying on increasingly advanced techniques more commonly seen in cyber-espionage cases, the antivirus company Symantec Corp. said.

While individuals are still the major target of such ransomware attacks, accounting for about 57 percent of recorded victims, infections of businesses and larger organizations are on the rise, spiking in late 2015, Symantec said recently in its annual “Ransomware and Businesses” report. With global losses due to ransomware attacks climbing, perpetrators have a “gold rush” mentality that is fueling new techniques and higher demands for payments.

“A growing number of gangs are beginning to focus on targeted attacks against large organizations,” according to the Mountain View, California-based company. “Although more complex and time-consuming to perform, a successful targeted attack on an organization can potentially infect thousands of computers, causing massive operational disruption and serious damage to revenues and reputation."

Ransomware hackers drew widespread attention earlier this year when they targeted Hollywood Presbyterian Medical Center’s systems in February. The hospital eventually paid 40 Bitcoin, the electronic currency that was worth about $17,000 at the time.

Two other California hospitals were attacked in the spring, leading to concerns that hospitals were becoming the target of choice for hackers, but the Symantec report said health care "does not appear among the most frequently infected sectors." The service industry and manufacturing industry were the targets of 38 and 17 percent of attacks on organizations from January 2015 to April 2016, respectively.

Ransomware attackers can gain access to files through items like an attachment to a spam e-mail or fake advertisement on a website. The attacks have been growing every year, with the FBI receiving more than 2,400 complaints in 2015 for $24 million in losses -- up from more than 1,800 complaints in 2014. With individuals still the primary victims, partly because they are less likely to have strong security software installed on their computers, the average ransom this year through April was $679.

Symantec’s report says that significant strides in file encryption technology is one of the main drivers of growth in the ransomware business. A record number of new strands, or families, of ransomware were detected in 2015 and about 80 percent of them were able to encrypt the files of the affected server.

Microsoft Corp.’s Windows platform is targeted the most, but the first widespread ransomware attack on the Apple Inc. Mac’s OS X software was recorded in March. Mobile phones are not yet widely attacked, the report said.

Information-Management

 

« What Executives Really Should Know About Social Media
Turning Big Data into Smart Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer

Freshfields Bruckhaus Deringer is a global law firm with a track record of successfully supporting the world's leading corporations, financial institutions and governments.

ESET

ESET

ESET provide security software for enterprises and consumers - Antivirus Software, Internet Security and Virus Protection.

Zimperium

Zimperium

Zimperium offers enterprise class protection for mobile devices against the next generation of advanced mobile attacks.

Cyber Command

Cyber Command

Our Managed IT service allows clients to offload the management of day-to-day computer, server, and networking support to our team of professionals.

OIC-CERT

OIC-CERT

OIC-CERT is the Computer Emergency Response Team for Organisation of Islamic Cooperation (OIC) member countries.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Vdoo

Vdoo

Vdoo provides an end-to-end product security platform for automating all software security tasks throughout the entire product lifecycle.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

IT Search

IT Search

IT Search is a specialist IT recruitment company focusing on Cyber Security, IT Infrastructure, Software, Data, Digital Transformation and C Suite leadership positions.

SecurityGate

SecurityGate

SecurityGate.io is the only Integrated Risk Management platform built for OT/ICS cybersecurity.

Alpha Omega Integration

Alpha Omega Integration

Alpha Omega creates new possibilities through intelligent end-to-end mission-focused government IT solutions.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

Olympix

Olympix

Dev-first Web3 security that starts at the source. Olympix is a pioneering DevSecOps tool that puts security in the hands of the developer by proactively securing code from day one.