Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Support

Store

Poweron Technology Blog

Poweron Technology has been serving the New Mexico area since 2004, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New Developments in Ransomware are Potentially Devastating

New Developments in Ransomware are Potentially Devastating

While it only makes sense to assume that a cybercriminal would focus specifically on those targets that would bring them the greatest profit—in other words, larger businesses—the reality of modern cybercrime renders this assumption grossly outdated. Let’s examine how different developments in ransomware have made it possible for cybercriminals to be far less discerning in who they target.

In No Uncertain Terms, Ransomware Has Grown More Dangerous

Let’s face facts for a moment: in order to be effective, a cybercriminal can take advantage of a few different challenges that small and medium-sized businesses frequently struggle with. For instance:

  • Cybercriminals frequently rely on deception in the form of phishing. Using phishing attacks, a cybercriminal bypasses the protections a business has in place by taking advantage of their employees in order to gain access to the business’ network.
  • A lack of communication between departments makes issues even greater. A lack of communications between a business’ departments can exacerbate the risks to be seen from cybercriminals.
  • Smaller businesses don’t always have the resources needed to prepare their team members. Unlike corporations, SMBs likely don’t have a dedicated budget for cybersecurity training, and almost certainly can’t afford the salary of a dedicated security professional on-staff.

On top of these opportunities, however, today’s cybercriminal has others they can exploit:

Automated Threats

Cybercriminals, like many of the businesses operating today, have embraced the concept of automation to their advantage. Rather than manually attacking individual targets, cybercriminals are able to wage widespread attacks with minimal effort. Even the extortion component of ransomware has become increasingly automated.

One ransomware variant, Avaddon, has been using automation to its advantage. With a Dark Web site listing the companies that have been infected, a countdown is provided that ticks away the time before data is automatically publicized.

Ransomware as a Service

Cybercrime is now a legitimate industry (in a manner of speaking), with teams of developers and commission-based structures responsible for spreading attacks far and wide. Ransomware as a Service is just one example of this, with a packaged ransomware attack bundled up for an aspiring cybercriminal to use. These kinds of services only make cyberattacks more accessible to those who would wage them.

Layered Extortion

Many ransomware attacks have historically extorted money from their victims more than once. Not only are the victims charged for resumed access to their data, but they then have to pay up to keep the attackers from leaking this data out.

Unfortunately for businesses, this approach has evolved. Now, this kind of extortion takes place in four parts:

  • The victimized business is instructed to pay for their access to their encrypted data to be restored.
  • Hackers release the data they’ve stolen if the ransom isn’t paid.
  • Denial of Service attacks are used to take down a victim’s website.
  • The cybercriminals responsible reach out to the targeted business’ customers, partners, employees, and the media to inform them of the hack.

All in all, these tactics have only made ransomware attacks more successful.

You Need to Be Ready to Resist Ransomware

Ransomware is a serious issue for businesses, and isn’t going away anytime soon. That’s why we’re here to help you stop it. Find out more about what we can do by calling (505) 899-4600 today.

Could Your IT Repair Itself After a Cyberattack?
Enhancing the Customer Experience with the Right I...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Thursday, November 07, 2024

Captcha Image

Latest Blog

A well-structured framework is essential for establishing effective, consistent policies and strategies. This applies to many areas—including network security. Today, we’re diving into the National Institute of Standards and Technology (NIS...

Contact Us

Learn more about what Poweron Technology
can do for your business.

(505) 899-4600

Poweron Technology
9000 Alameda Blvd NE
Albuquerque, New Mexico 87122

Account Login