Partner Perspectives //

bitdefender

1/5/2017
10:28 AM
Luana Pascu
Luana Pascu
Partner Perspectives
50%
50%

2017 To Bring More Ransomware, IoT DDoS Attacks, And SCADA Incidents

As hackers begin to target corporations in an attempt to extort higher ransom fees, the threat will only become more serious.

Racking up $1 billion in financial losses, 2016 was the year of ransomware. And 2017 will turn encrypting ransomware with automated targeting into a threat more prevalent than ever. The pervasiveness of IoT devices -- and their lax security -- across industries will enable further DDoS attacks through IoT botnets infected with Mirai malware, turning them and SCADA (supervisory control and data acquisition) incidents into the top cyberthreats in 2017.

Ransomware is one of the most aggressive online threats, leading to significant revenue loss for the companies infected. In 2016 alone, reports show, almost half of companies in the United States have been hit by ransomware. And the threat is growing, according to the FBI, as hackers start targeting corporations in an attempt to extort higher ransom fees.

Ransomware variants for Linux, Windows, Android, and Mac OS have been shown to target both private users and enterprises, with criminals not only encrypting computer data, but threatening to reveal all the information online unless the victim pays a substantial amount in bitcoin.

So far, ransomware attacks have been revealed worldwide against healthcare facilities and hospitals (Hollywood Presbyterian Medical Center and Kentucky Hospital, both in the US), universities (University of Calgary in Canada and Bournemouth University in the UK), and police departments (Melrose Police Department in the US), with ransoms ranging between $200 and $10,000. And, in 2017, ransoms are likely to rise as attacks become fiercer.

From the beginning, ransomware has been successful because victims are usually willing to pay to regain access to their private data, although the amounts differ based on geographical areas. In this sense, US consumers have shown more attachment to their data and a greater willingness to pay ransom than German consumers, according to a Bitdefender survey.

Criminals don’t need a deep technical background or much money to attack a business or government. Hackers can just go to the dark web and buy a ransomware package, sometimes quite cheaply. For criminals, it’s easy money. But as they gain experience, it’s a challenge to keep track of all the ransomware variants developed to bypass traditional antimalware solutions. CryptoLocker, CryptoWall, Petya, Locky, and TeslaCrypt are only some of the types out there. Since CryptoLocker was terminated in 2014, CryptoWall has been one of the most prominent types of malware used in the US, according to the FBI.

Ransomware can hide inside an app you’ve just downloaded, a spam email campaign, or most often on suspicious websites that will infect your device. Most frequently, users fail to recognize it because it makes clever use of social engineering to impersonate law enforcement or other instructions and trick users into believing they have to pay a fine or take some other action.

Theoretically, you get access back after paying ransom in bitcoin. In many cases, though, the data is never recovered, even after a ransom payment. But should you pay the ransom if your company network has been affected? The FBI says no and encourages users to immediately reach out to them.

To minimize the risks of ransomware infection, use a reputable endpoint security solution and regularly patch or update endpoint software to prevent vulnerability exploits. Perform constant backups of your data, limit user access to mapped network drives, and train employees to detect malware campaigns and to exhibit safe online behavior.

Luana Pascu is a security specialist with Romanian antivirus vendor Bitdefender. After writing about NFC, startups, and tech innovation, she has now shifted focus to internet security, with a keen interest in smart homes and IoT threats. Luana is a supporter of women in tech ... View Full Bio
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
To Click or Not to Click: The Answer Is Easy
Kowsik Guruswamy, Chief Technology Officer at Menlo Security,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19296
PUBLISHED: 2018-11-16
PHPMailer before 5.2.27 and 6.x before 6.0.6 is vulnerable to an object injection attack.
CVE-2018-19301
PUBLISHED: 2018-11-15
tp4a TELEPORT 3.1.0 allows XSS via the login page because a crafted username is mishandled when an administrator later views the system log.
CVE-2018-5407
PUBLISHED: 2018-11-15
Simultaneous Multi-threading (SMT) in processors can enable local users to exploit software vulnerable to timing attacks via a side-channel timing attack on 'port contention'.
CVE-2018-14934
PUBLISHED: 2018-11-15
The Bluetooth subsystem on Polycom Trio devices with software before 5.5.4 has Incorrect Access Control. An attacker can connect without authentication and subsequently record audio from the device microphone.
CVE-2018-14935
PUBLISHED: 2018-11-15
The Web administration console on Polycom Trio devices with software before 5.5.4 has XSS.