Ransomware Hackers Are Getting More Advanced

Hackers using software to block data and then demand money in return are relying on increasingly advanced techniques more commonly seen in cyber-espionage cases, the antivirus company Symantec Corp. said.

While individuals are still the major target of such ransomware attacks, accounting for about 57 percent of recorded victims, infections of businesses and larger organizations are on the rise, spiking in late 2015, Symantec said recently in its annual “Ransomware and Businesses” report. With global losses due to ransomware attacks climbing, perpetrators have a “gold rush” mentality that is fueling new techniques and higher demands for payments.

“A growing number of gangs are beginning to focus on targeted attacks against large organizations,” according to the Mountain View, California-based company. “Although more complex and time-consuming to perform, a successful targeted attack on an organization can potentially infect thousands of computers, causing massive operational disruption and serious damage to revenues and reputation."

Ransomware hackers drew widespread attention earlier this year when they targeted Hollywood Presbyterian Medical Center’s systems in February. The hospital eventually paid 40 Bitcoin, the electronic currency that was worth about $17,000 at the time.

Two other California hospitals were attacked in the spring, leading to concerns that hospitals were becoming the target of choice for hackers, but the Symantec report said health care "does not appear among the most frequently infected sectors." The service industry and manufacturing industry were the targets of 38 and 17 percent of attacks on organizations from January 2015 to April 2016, respectively.

Ransomware attackers can gain access to files through items like an attachment to a spam e-mail or fake advertisement on a website. The attacks have been growing every year, with the FBI receiving more than 2,400 complaints in 2015 for $24 million in losses -- up from more than 1,800 complaints in 2014. With individuals still the primary victims, partly because they are less likely to have strong security software installed on their computers, the average ransom this year through April was $679.

Symantec’s report says that significant strides in file encryption technology is one of the main drivers of growth in the ransomware business. A record number of new strands, or families, of ransomware were detected in 2015 and about 80 percent of them were able to encrypt the files of the affected server.

Microsoft Corp.’s Windows platform is targeted the most, but the first widespread ransomware attack on the Apple Inc. Mac’s OS X software was recorded in March. Mobile phones are not yet widely attacked, the report said.

Information-Management

 

« What Executives Really Should Know About Social Media
Turning Big Data into Smart Data »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

GigaOm

GigaOm

GigaOm's mission is to provide enterprises with information and analysis to help them make better decisions about technology.

Egress Software Technologies

Egress Software Technologies

Egress Software Technologies is a leading provider of data security services designed to protect shared information throughout its lifecycle.

ShmooCon

ShmooCon

ShmooCon is an annual east coast hacker convention offering three days of demonstrations and discussions of critical infosec issues.

CIO Dive

CIO Dive

CIO Dive provides news and analysis for IT executives in areas including IT strategy, cloud computing, cyber security, big data, AI, software, infrastructure, dev ops and more.

Maticmind

Maticmind

Maticmind is an ICT System Integrator providing solutions and specialized skills in Networking, Security, Unified Communications & Collaboration, Datacenter & Cloud and Application.

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

Telecommunications & Digital Government Regulatory Authority (TDRA) - UAE

TDRA focuses on regulating the telecommunications sector and enabling government entities in the field of smart transformation. It is responsible for the overall digital infrastructure in the UAE.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Hudson Cybertec

Hudson Cybertec

Hudson Cybertec are an internationally recognized Subject Matter Expert for cyber security in the Industrial Automation & Control Systems (IACS) domain.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Stryve

Stryve

Stryve is a leading carbon-neutral provider of specialist cloud and cybersecurity services in Europe.

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

Commonwealth Scientific & Industrial Research Organisation (CSIRO)

CSIRO is Australia's national science agency. We solve the greatest challenges through innovative science and technology.

Technation

Technation

Technation proudly represents the Canadian technology companies that are furthering our nation and the world into the future through innovation, creativity and ingenuity.

Bearer

Bearer

Bearer helps modern teams ship trustworthy products with the help of our code security solution built for security, privacy and engineering teams.

ITUS Secure Technologies

ITUS Secure Technologies

ITUS offer fully outsourced cybersecurity solutions working with leading security vendors, providing next-gen solutions.