Ransomware – If you want your data back you’ll have to pay for it

Ransomware –  If you want your data back you’ll have to pay for it

Part 4: 5 phishing tactics threatening UK businesses

So far in this series of phishing awareness blogs we’ve looked at CEO Fraud, malicious attachments and malicious links. The previous two posts explored the techniques deployed by cyber criminals to infect recipients’ systems with malicious software.  Today’s blog looks at ransomware.

Increasingly, cyber criminals are commercialising malware to blackmail their victims. This type of malware is called ransomware.

Since the first cases in Russia 10 years ago, ransomware has evolved rapidly, becoming a lucrative practice for cyber criminals across the globe.

The attackers send emails with links or attachments to malware designed to encrypt documents – rendering them unreadable, or to lock the recipients out of their operating system, effectively disabling them. Victims are duly told to pay a ransom to decrypt their files or to allow them back in to their computer or phone.

The international use of Bitcoin, which is less traceable than other payment methods, has made it easier for cyber criminals to undertake such attacks. Consequently, ransomware comes in a variety of ugly forms:

  • SMS (text message) requires victims to call premium rate numbers to unlock their devices.
  • Reveton impersonates police enforcement agencies. Emails typically accuse recipients of accessing illegal images, instructing them to pay a fine.
  • Cryptolocker is a recent type of ransomware for encrypting files and locking the user’s system.
  • CryptXXX is another new malware which reportedly made $45,000 in the space of three weeks. Thankfully, it seems to have been defeated by anti-virus companies.
  • Locky, ‘GameOver Zeus’ are other variants you may have come across, though not as frequently as law enforcement has clamped down on the infrastructure the malware relies on.

Cryptolocker in particular represents an ongoing threat to UK businesses since the first cases were reported in 2013. Organisations failing to back-up their files have no choice but to pay the ransom.

The ransomware is so tough to crack, even the FBI advises US victims to “just pay the ransom.”

How to reduce the risk of your company being blackmailed by ransomware

  • Provide regular awareness training for your staff.
  • Simulate a targeted phishing attack with PhishAware
  • Use the results to understand which departments and locations within your business are most at risk

Learn more about PhishAware

Receive the full infographic of the 5 hot trends in phishing tactics here:

Send me the Infographic

Related Content

PRCON 2011

PRCON 2011

Whilst we are ardent supporters of maintaining a healthy balance between work and life and well awar...

Welcome to the Perspective Risk Blog

Welcome to the Perspective Risk Blog

The Perspective Risk blog has been created to provide information security resources to the penetrat...