Home Tags Ransomware

Tag: Ransomware

Ransomware is a Cryptovirology attack carried out using covertly installed malware that encrypts the victim’s files and then requests a ransom payment in return for the decryption key that is needed to recover the encrypted files. Thus, ransomware is an access-denial type of attack that prevents legitimate users from accessing files since it is intractable to decrypt the files without the decryption key. Other attacks superficially lock the system and display messages intended to coax the user into paying. Ransomware typically propagates as a Trojan, whose payload is disguised as a seemingly legitimate file.

While initially popular in Russia, the use of ransomware scams has grown internationally; in June 2013, security software vendor McAfee released data showing that it had collected over 250,000 unique samples of ransomware in the first quarter of 2013, more than double the number it had obtained in the first quarter of 2012. Wide-ranging attacks involving encryption-based ransomware began to increase through Trojans such as CryptoLocker, which had procured an estimated US$3 million before it was taken down by authorities, and CryptoWall, which was estimated by the US Federal Bureau of Investigation (FBI) to have accrued over $18m by June 2015.

Cyber-Attacks Continue to Be Financially Motivated, Verizon Finds

Verizon's 2017 Data Breach Investigations Report finds that hacking and malware are the leading causes of breaches, with ransomware use growing.

Ransomware Payout Doesn’t Pay Off

About 40% of small- and midsized businesses hit with ransomware paid their attackers, but less than half got their information back.

Use of DNS Tunneling for C&C Communications

Often, virus writers don't even bother to run encryption or mask their communications. However, you do get the occasional off-the-wall approaches that don't fall into either of the categories.

Take, for instance, the case of a Trojan that Kaspersky Lab researchers discovered in mid-March and which establishes a DNS tunnel for communication with the C&C server.

Ransomware, Cyberespionage Dominate Verizon DBIR

Verizon's Data Breach Investigations Report for 2017 shows big growth in the reported number of ransomware attacks and incidents involving cyberespionage.

Lack of Communication Achilles’ Heel for Ransomware Fighters

A member of law enforcement acknowledged at SOURCE Boston that the lack of communication around ransomware remains a serious problem.

Verizon Data Breach Investigations Report Reveals Ransomware Surge

While some numbers have shifted, Verizon researcher says that year-over-year, little has actually changed and the same types of attacks continue to be successful.

APT Threat Evolution in Q1 2017

Kaspersky Lab is currently tracking more than a hundred threat actors and sophisticated malicious operations in over 80 countries.

During the first quarter of 2017, there were 33 private reports released to subscribers of our Intelligence Services, with IOC data and YARA rules to assist in forensics and malware-hunting.

Ransomware up. Breaches up. What do hackers want? Research, prototypes… all...

Verizon super depressing report's in Cyberespionage and ransomware attacks are on the increase, according to the latest annual edition of Verizon's breach report.…

Ransomware incidents surge, education a hot bed for data breaches, according...

Verizon's Data Breach Incident Report for 2017 has a few key takeaways worth noting for healthcare and the education sectors.

Ransomware Recovery 101: You’ve Been Hit, Now What Do You Do?

Even though the majority of companies will at some point experience a ransomware attack, most do not know how to appropriately recover from one. Here's what you should do.

Will your business be next? Customisable ransomware makes it easy for...

An easy-to-use form of ransomware is enabling even low-level cybercrimals to tailor attacks against organisations or even individuals with personalised ransom notes

Web Attacks Decline, Ransomware Attacks Surge

Symantec's annual Internet Security Report data shows how attacks last year directly targeted end users, and became more efficient and lucrative.