The Future Of Ransomware Is In The Cloud

The cyber security lanscape is evolving and many businesses don’t understand how to keep their defences  up-to-date. While major corporations can spend as much as $1 billion a year, many small companies may not have the budget to hire a cybersecurity vendor to help them keep up with all the technology available needed to deter hackers. The loss of just a few thousand dollars can be devastating and hackers don’t discriminate when casting a wide net. 
 
Hackers are mining for data, passwords and other bits of information that can open the door to a company’s assets. Email scams, password and login theft, malware and ransomware are a;; among the cybercriminals’ primary weapons. 
 
Cyber security threats have been contantly growing in 2019, according to a new report by Crypsis Group, an incident management and digital forensics company. The Crypsis 2020 Incident Response and Data Breach Report, which found that cyber criminals have “significantly escalated tactical approaches” and become more targeted in their actions. 
 
Ransomware attacks and business email compromise (BEC) were the two most impactful cyber threats in 2019 with ransomware demands up  200% last year, and BEC fraud losses averaged $264,000 per incident. 
 
Software as a Service (SaaS) is being increasingly used and is a method of software delivery and licensing in which software is accessed online via a subscription, rather than bought and installed on individual computers. The Covid virus pandemic has forced businesses to start working from home on a massive scale, and SaaS platforms now have switched from being a matter of choice to a necessity. While the long-term advantages of this global switch are yet to be discovered, SaaS security threats are already out there. One of the most threatening is ransomware 2.0.
 
It's a new generation of attacks, using sophisticated types of ransomware, that spreads to the cloud and encrypts SaaS data of cloud services.
 
The average ransom payment was $41,000 in 2019, although yber liability insurance firms say that the  the real cost of a ransomware attack for a company with 50 employees has reached $73,000. This cost includes: Ransom fees, Forensics, Legal Fees, Fines and Penalties and Data Recovery payments. 
 
Ransomware has become a multibillion-dollar industry for cyber criminals, who to maximise their profits, are expanding to new  potential markets with a particular focus on the fast growing Cloud coputing sector.
 
Ransomware Criminals Are Targeting The Cloud 
Cyber-criminal new market opportunities. Many offline businesses are closed due to COVID-19, which reduces new opportunities for cyber-criminals. Phishing attacks are up 667% since the pandemic began. Cyber-criminals seem to be looking for new ways to generate revenue. Cloud services have become mission-critical apps for successful businesses. The spread of coronavirus will push companies to speed up their cloud adoption. Many organisations already can't imagine their business without cloud services. It’s only a matter of time until ransomware starts targeting cloud data.
 
A  Scenario For A  Cloud Ransomware Attack:
 
  • A user gets an email that looks like it was sent from their cloud service provider. It requires the user to click a phishing link to update an app.
  • A user installs a malicious app or a Chrome extension that requests a scope of permissions to access G Suite or Office 365 SaaS data.
  • Once permissions are granted, the app starts encrypting data directly in the cloud.
Ransomware that targets the cloud is here. and we can expect that in  the next one to two years, this evolution will  accelerate, with the emergence of a whole new generation of  ransomware.
 
Back Up Your Data. Use an independent cloud-to-cloud backup provider to back up your sensitive SaaS data to secure cloud storage. AWS, GCP and Azure are the most secure and trusted cloud storage services. Daily backup is a very important part of this process.
 
Protect Yourself Against Phishing. Deploy an anti-phishing monitoring solution. The majority of phishing emails are designed to run ransomware attacks.
 
Monitor Third-Party Apps. Deploy monitoring and risk assessment of the third-party apps installed by your employees, such as marketplace apps, chrome extensions, add-ons, iOS apps, Android apps, non-marketplace apps and any other apps that have access to your SaaS data. Some of the apps can be time bombs and run ransomware attacks when you never expect it.
 
It Important to Train Your Employees to Watch for Cyber Threats. Educate your employees by implementing security awareness training on a quarterly basis. Continue doing all the necessary data security work: Manage files’ permissions and access.  Outline clear security policies, and educate your employees on cyber security matters through corporate training.
 
Crypsis:     Forbes:     SC Magazine:     Insurance Business:      Arkanasa Business: 
 
Business need cyber security training and we at Cyber Security Intelligence recommend GoCyber training for all employees and management please contact Cyber Security Intelligence for a free trial.
 
You Might Also Read: 
 
Cyber Crime Methods Are Evolving:
 
Managing Your Cyber Security, Detection & Response:
 
 
« Blame The Boss For Cyber Attacks
Inside The Deep & The Dark Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Nutanix

Nutanix

The Nutanix enterprise cloud platform provides performance, robust security, and seamless application mobility for a broad range of enterprise applications.

Compass Security

Compass Security

Compass Security is a specialist IT Security consultancy firm based in Switzerland. Services include pentesting, security assessments, digital forensics and security training.

ESTsecurity

ESTsecurity

ESTsecurity is a leading company in cyber security providing intelligent security solutions to make world more secure.

Securitybulls

Securitybulls

Securitybulls is an information security firm offering an encyclopedic penetration testing & IT security assessment service for your organization.

Digital Arts

Digital Arts

Digital Arts provides internet security software and appliance products for companies and individuals.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

KnectIQ

KnectIQ

Building Trust Environments in a Zero-Trust World. KnectIQ offers KIQAssure, an Ultra High Security Solution for Data in Flight.

Enzoic

Enzoic

Enzoic is an enterprise-focused cybersecurity company committed to preventing account takeover and fraud through compromised credential detection.

TransUnion

TransUnion

TransUnion is a global information and insights company that makes it possible for businesses and consumers to transact with confidence.

Valency Networks

Valency Networks

Valency Networks provide cutting edge results in the areas of Vulnerability Assessment and Penetration Testing services for webapps, cloud apps, mobile apps and IT networks.

Forta

Forta

Forta is a real-time detection network for security & operational monitoring of blockchain activity.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

HIFENCE

HIFENCE

HIFENCE delivers cybersecurity and networking services that make your company safer and more secure. That’s all we do, so you can concentrate on all the things that you do best.

Offenso Hackers Academy

Offenso Hackers Academy

At Offenso we focus on cyber security training focused on producing cyber security professionals with a wide range of abilities to counter threats from the internet and cloud to a business.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.