The Future Of Ransomware Is In The Cloud

The cyber security lanscape is evolving and many businesses don’t understand how to keep their defences  up-to-date. While major corporations can spend as much as $1 billion a year, many small companies may not have the budget to hire a cybersecurity vendor to help them keep up with all the technology available needed to deter hackers. The loss of just a few thousand dollars can be devastating and hackers don’t discriminate when casting a wide net. 
 
Hackers are mining for data, passwords and other bits of information that can open the door to a company’s assets. Email scams, password and login theft, malware and ransomware are a;; among the cybercriminals’ primary weapons. 
 
Cyber security threats have been contantly growing in 2019, according to a new report by Crypsis Group, an incident management and digital forensics company. The Crypsis 2020 Incident Response and Data Breach Report, which found that cyber criminals have “significantly escalated tactical approaches” and become more targeted in their actions. 
 
Ransomware attacks and business email compromise (BEC) were the two most impactful cyber threats in 2019 with ransomware demands up  200% last year, and BEC fraud losses averaged $264,000 per incident. 
 
Software as a Service (SaaS) is being increasingly used and is a method of software delivery and licensing in which software is accessed online via a subscription, rather than bought and installed on individual computers. The Covid virus pandemic has forced businesses to start working from home on a massive scale, and SaaS platforms now have switched from being a matter of choice to a necessity. While the long-term advantages of this global switch are yet to be discovered, SaaS security threats are already out there. One of the most threatening is ransomware 2.0.
 
It's a new generation of attacks, using sophisticated types of ransomware, that spreads to the cloud and encrypts SaaS data of cloud services.
 
The average ransom payment was $41,000 in 2019, although yber liability insurance firms say that the  the real cost of a ransomware attack for a company with 50 employees has reached $73,000. This cost includes: Ransom fees, Forensics, Legal Fees, Fines and Penalties and Data Recovery payments. 
 
Ransomware has become a multibillion-dollar industry for cyber criminals, who to maximise their profits, are expanding to new  potential markets with a particular focus on the fast growing Cloud coputing sector.
 
Ransomware Criminals Are Targeting The Cloud 
Cyber-criminal new market opportunities. Many offline businesses are closed due to COVID-19, which reduces new opportunities for cyber-criminals. Phishing attacks are up 667% since the pandemic began. Cyber-criminals seem to be looking for new ways to generate revenue. Cloud services have become mission-critical apps for successful businesses. The spread of coronavirus will push companies to speed up their cloud adoption. Many organisations already can't imagine their business without cloud services. It’s only a matter of time until ransomware starts targeting cloud data.
 
A  Scenario For A  Cloud Ransomware Attack:
 
  • A user gets an email that looks like it was sent from their cloud service provider. It requires the user to click a phishing link to update an app.
  • A user installs a malicious app or a Chrome extension that requests a scope of permissions to access G Suite or Office 365 SaaS data.
  • Once permissions are granted, the app starts encrypting data directly in the cloud.
Ransomware that targets the cloud is here. and we can expect that in  the next one to two years, this evolution will  accelerate, with the emergence of a whole new generation of  ransomware.
 
Back Up Your Data. Use an independent cloud-to-cloud backup provider to back up your sensitive SaaS data to secure cloud storage. AWS, GCP and Azure are the most secure and trusted cloud storage services. Daily backup is a very important part of this process.
 
Protect Yourself Against Phishing. Deploy an anti-phishing monitoring solution. The majority of phishing emails are designed to run ransomware attacks.
 
Monitor Third-Party Apps. Deploy monitoring and risk assessment of the third-party apps installed by your employees, such as marketplace apps, chrome extensions, add-ons, iOS apps, Android apps, non-marketplace apps and any other apps that have access to your SaaS data. Some of the apps can be time bombs and run ransomware attacks when you never expect it.
 
It Important to Train Your Employees to Watch for Cyber Threats. Educate your employees by implementing security awareness training on a quarterly basis. Continue doing all the necessary data security work: Manage files’ permissions and access.  Outline clear security policies, and educate your employees on cyber security matters through corporate training.
 
Crypsis:     Forbes:     SC Magazine:     Insurance Business:      Arkanasa Business: 
 
Business need cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management please contact Cyber Security Intelligence for a free trial.
 
You Might Also Read: 
 
Cyber Crime Methods Are Evolving:
 
Managing Your Cyber Security, Detection & Response:
 
 
« Blame The Boss For Cyber Attacks
Inside The Deep & The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

CyberOwl

CyberOwl

CyberOwl builds on cutting-edge research and combines decades of experience in developing, securing and operating large distributed systems.

DocAuthority

DocAuthority

DocAuthority automatically discovers and accurately identifies unprotected, sensitive documents, enabling a broad yet business-friendly security policy.

Untangle

Untangle

Untangle provides network security products designed specifically for the below-enterprise market, safeguarding businesses, home offices, nonprofits, schools and governmental organizations.

Wolfpack Information Risk

Wolfpack Information Risk

Wolfpack specialise in information and cyber threat management covering the full spectrum of prevention, detection, incident response and business resilience capabilities.

Physec

Physec

Physec offers innovative security products and solutions for the Internet of Things ecosystem.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

NinjaJobs

NinjaJobs

NinjaJobs is a community-run job platform developed by information security professionals. We focusing strictly on cybersecurity positions.

iProov

iProov

iProov delivers authentication and verification simply and securely, based on a genuine one-time biometric.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Norma Inc.

Norma Inc.

Norma provides the secured wireless environment (WiFi and Bluetooth) with the unauthorized AP detection, and secures your IoT assets from various threats.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

OneStep Group

OneStep Group

OneStep Group are a leading Australian provider of information and communications technology (ICT) services, connecting businesses through technology solutions and support.

Cybit

Cybit

Cybit is the one-stop-shop for digital transformation that scales in line with your growth.