Ransomware Risk Analysis – Ransomware Investigation – Ransomware Attack
Conti Cybercrime Gang
>> News-Link on Conti cybercrime gang
College shuts Down after Ransomware Attack
>> News-Link: Ransomsware Closes College Permanently
Microsoft Fighting Ransomware
Costa Rica national emergency after Conti ransomware
News-Link 2 >> on Costa Rica State of Emergency Under Sustained Conti Cyberattacks
Ransomware As a Service
The threat of ransomware has grown over the years. Millions of organizations and companies have been hacked. The costs amount globally to billions of USD and the number of future ransomware cases is projected to rise even more.
Ransomware attacks are now a very common type of tool used by attackers. Organized crime groups and criminal ransomware gangs will use targeted ransomware attacks which can cost organizations millions of dollars. Besides that, your data might still be appearing on the dark web in data breaches. Even when you have paid… Getting back on your feet will require many days, if not weeks or months to have your computers working again and regain full access to the servers and your data.
Ransomware is a type of malware that will:
Is your company & customer data protected from ransomware?
- ransomware attackers can threaten to publish the victim’s personal data online
- ransomware can block access to your device until you pay the ransom fee
- ransomware will extort the victim (extortion attack)
- ransomware will publish your files on the dark web if you don’t pay or cooperate
Do you want to pay the ransom?
The tracking and prosecution of suspects can prove to be a challenge since cybercriminals use cryptocurrency to collect the ransom fee (difficult to trace) and other techniques remain anonymous.
The main types of ransomware are:
- Encrypting ransomware
- Non-encrypting ransomware
- Data Exfiltration ransomware
- Crypto ransomware or encryptors will encrypt your files and data. you need a decryption key to access your data.
- Lockers will lock you out of your computer. Files & applications are not accessible. Ransom demand is requested via lock-screen with a countdown clock.
- Scareware will claim false positives and requests money.
- Doxware or leak-ware will threaten you to distribute your data online unless you pay
- RaaS (Ransomware as a Service) is a complex malware system that uses anonymous command and control centers to distribute ransomware & collect the ransom payment.
Most ransomware infections are spread via phishing emails, or by attachments with fake invoices or other deceiving fake information. Be careful what you click on, be careful which attachment you open.
Lifecycle of a Ransomware incident
Establish a good risk management strategy
Whatever type of cybersecurity measurements you have in place, no system is perfect and humans are not perfect. Neither are computer systems. Hence a good risk management strategy must start with a ransomware risk assessment.
This is where AR INTELL can assist you with a ransomware investigation.