Ransomware - Get A Step Ahead

Ransomware is a global threat to all organisations, and it cost the global economy an estimated US$20 billion in 2021. It is the most prominent security threat that businesses now face and certainly one of the most aggressive forms of cybercrime. 

Ransomware is a form of malware which can either lock you out of your network or encrypt all your data. Once your system has been infected, the malware will ask you to pay a ransom, usually in the form of an untraceable crypto currency such as Bitcoin, in exchange for the return or decryption of your data.

It often starts life as malicious malware that infects a single PC or infiltrates the entire network, including servers, and seizes control of critical data. Once infected, the ransomware element encrypts documents and files.

One common misconception about ransomware attacks is that they only involve ransomware ie “pay me to get your systems and data back”, but these attacks have evolved into general extortion attacks. 
While ransom is still the main monetisation angle, attackers are also stealing sensitive data, yours and your customers’, and threatening to disclose or sell it on the Dark Web or Internet and often they will hold onto it for later extortion attempts and future attacks.

Large, medium or small business no government, business or organisation is immune to a ransomware attack.

Ransomware is a type of malware that prevents you from accessing your computer and the data that it stores. The computer itself may become locked, or the data on it might be stolen, deleted, or encrypted.  For those hacked by an attack, recovery cost an average of USD$1.8 million, and about 30% of firms paid the ransom to retrieve their data.

Ransomware Is Changing

Cyber criminals are constantly changing their tactics. 2021 saw several major ransomware attacks. Probably the most high-profile was the Colonial Pipeline attack. This led to the US government managing to shut-down the ransomware operator REvil. However, the problem has not gone away. Other attackers are keen to avoid similar retribution so many operators are staging false shutdowns and reopening under new names. Consequently,  organisations need to take the right steps to improve their security and resiliency of their systems.

Protect Your Organisation

  • Plan and test your incident response: Most importantly, ransomware protection means preparing for an attack by ensuring that everyone understands the impact of ransomware on their organisation; they know how to respond if hit with an attack and that key files are backed up so that data can be recovered. 

Every plan should be evaluated at least annually through a tabletop exercise which may involve an external audit or third-party vendors.

  • Invest in expert cyber security monitoring from a Security Operations Centre that can identify breaches before an attack is launched, and regularly patch vulnerabilities to your network

Research on the first quarter of 2022 by threat intelligence firm Analyst1, has shown that cyber criminals are shifting ransomware tactics away from corporate ‘big game hunting’ and instead attacking medium-sized businesses.

Distributed Denial of Service (DDoS)

DDoS is becoming an increasingly common tactic leveraged before and during ransomware attacks. Attackers use bots to direct huge quantities of fraudulent traffic to a victim’s website and online services, seeking to overwhelm their system and prevent real traffic from getting through.

Protect your Organisation from a DDoS attack:

  • You need a CDN or DDoS Protection service. This is a service that can filter out malicious traffic while allowing legitimate users to get through. If you already have one, make sure it is correctly configured.
  • Get to know your typical Internet traffic patterns, so you can identify when something’s not right.
  • Implement the cyber hygiene controls recommended by the NCSC.

Conclusion

Law enforcement do not encourage, endorse, nor condone the payment of ransom demands. If you do pay the ransom

  • There is no guarantee that you will get access to your data or computer.
  • Your computer will still be infected.
  • You will be paying criminal groups.
  • You're more likely to be targeted in the future.

Attackers will also threaten to publish data if payment is not made. To counter this, organisations should take measures to minimise the impact of data exfiltration.

Ransomware has become a booming enterprise, with criminals boldly advertising their ransomware service offerings. It is up to cybersecurity professionals and business stakeholders to keep up with evolving ransomware software and protect networks and the valuable data contained within from ransomware attacks.

Businesses need to remain vigilant, frequently up-date and review your cyber security strategy, stay informed and work with cyber security experts to implement the right preventative measures that will ensure that your cyber resiliency is strong and makes it far more difficult for a malicious party to penetrate your system.

Please contact Cyber Security Intelligence if you would like to discuss your security requirements and get advice and recommendations.

NCSC:     IBM:    Business Leader:      Mimecast:      IT Secure:   Securus Comms:    Microsoft:  

You Might Also Read: 

Extortion: Most British Firms Pay The Ransom:

 

« Innovative Cyber Training
Energy Companies Unready For Lethal Cyber Attacks »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

RedTeam Security

RedTeam Security

RedTeam Security is a provider of Penetration Testing, Social Engineering, Red Teaming and Red Team Training services.

PFP Cybersecurity

PFP Cybersecurity

PFP provides a SaaS solution for life-cycle protection based on our IoT security platform and power usage analytics.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Findings

Findings

Findings (formerly IDRRA) is a scalable AI powered assessment platform that streamlines security compliance across sectors, jurisdictions and regulatory frameworks.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

National Accreditation Authority Hungary (NAH)

National Accreditation Authority Hungary (NAH)

NAH is the national accreditation body for Hungary. The directory of members provides details of organisations offering certification services for ISO 27001.

Flix11

Flix11

Flix11 is a Cyber Security & ICT Solutions focused company. We provide a range of products and services in Cyber Security, Internet of Things (IoT) and infrastructure solutions.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

Ignite Cyber

Ignite Cyber

IGNITE Cyber is focused on enabling secure technology adoption through intelligent business decisions. We are focused on providing a secure and stable business environment for everyone.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

FearsOff

FearsOff

FearsOff is a global information security company serving clients worldwide. White hat operators with a black hat mindset to emulate real world attacks and everchanging threat vectors.