Threat Intelligence

7/25/2017
12:00 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

No More Ransom celebrates its first year

Over 28,000 devices decrypted and 100+ global partners signed up.

Woburn, MA – One year ago on July 25, 2016, the No More Ransom initiative was launched by the Dutch National Police, Europol, McAfee and Kaspersky Lab. Today, more than 100 partners have joined the initiative, as major ransomware attacks continue to dominate the news, hitting businesses, governments, and individuals all over the world.

The threat of ransomware is escalating

Ransomware attacks have soared since 2012, luring criminals with the promise of profit and ease of implementation. More new ransomware families, variants of existing families and attacks are uncovered every day. The total number of people worldwide who encountered ransomware rose to 2,581,026 from April 2016 to March 2017, an increase of 11.4 percent over the previous 12 months.

As the threat continues to evolve, becoming stealthier and more destructive, businesses are often targeted as they offer much higher potential returns than individuals. The indiscriminate WannaCry attacks in mid-May claimed more than 300,000 business victims across 150 countries in its first few days, crippling critical infrastructure and halting business operations worldwide.

No More Ransom’s first year in numbers

The No More Ransom site now carries 54 decryption tools, provided by nine partners and covering 104 families of ransomware. So far, these tools have managed to decrypt more than 28,000 devices.

The portal has had more than 1.3 million unique visitors to date. On May 14 alone, during the WannaCry crisis, 150,000 people visited the website.

The No More Ransom platform is now available in 26 languages, with the most recent additions being Bulgarian, Chinese, Czech, Greek, Hungarian, Indonesian, Malay, Norwegian, Romanian, Swedish, Tamil and Thai.

More than 100 partners: No boundaries between private, public or competitors

No More Ransom now has 109 partners. The most recent private sector additions include: Abelssoft, Ascora GmbH, Barclays, Bitsight, Bournemouth University, CERT.BE, Claranet, CSA Singapore, ESTSecurity, Fortinet, Global Forum on Cyber Expertise, InterWorks, IPA, Korean Internet & Security Agency, TWCERT/CC, LLC, University of Porto and vpnMentor. Four new law enforcement agencies have also joined from Czech Republic, Greece, Hong Kong and Iran.

The success of the No More Ransom initiative is a shared success, one that cannot be achieved by law enforcement or private industry alone. By joining forces, we enhance our ability to take on the criminals and stop them from harming people, businesses, and critical infrastructure, once and for all.

No better cure than prevention

Global law enforcement, in close cooperation with private partners, has ongoing investigations into ransomware criminals and infrastructure; however, prevention is undoubtedly the best ransomware defense. Internet users need to avoid becoming a victim in the first place. Many up-to-date prevention tips are available on www.nomoreransom.org. If you do become a victim, it is important not to pay the ransom and report your infection to the police.

 

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Veterans Find New Roles in Enterprise Cybersecurity
Kelly Sheridan, Staff Editor, Dark Reading,  11/12/2018
Empathy: The Next Killer App for Cybersecurity?
Shay Colson, CISSP, Senior Manager, CyberClarity360,  11/13/2018
Understanding Evil Twin AP Attacks and How to Prevent Them
Ryan Orsi, Director of Product Management for Wi-Fi at WatchGuard Technologies,  11/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Online Malware and Threats: A Profile of Today's Security Posture
Online Malware and Threats: A Profile of Today's Security Posture
This report offers insight on how security professionals plan to invest in cybersecurity, and how they are prioritizing their resources. Find out what your peers have planned today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-15769
PUBLISHED: 2018-11-16
RSA BSAFE Micro Edition Suite versions prior to 4.0.11 (in 4.0.x series) and versions prior to 4.1.6.2 (in 4.1.x series) contain a key management error issue. A malicious TLS server could potentially cause a Denial Of Service (DoS) on TLS clients during the handshake when a very large prime value is...
CVE-2018-18955
PUBLISHED: 2018-11-16
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resour...
CVE-2018-19311
PUBLISHED: 2018-11-16
Centreon 3.4.x allows XSS via the Service field to the main.php?p=20201 URI, as demonstrated by the "Monitoring > Status Details > Services" screen.
CVE-2018-19312
PUBLISHED: 2018-11-16
Centreon 3.4.x allows SQL Injection via the searchVM parameter to the main.php?p=20408 URI.
CVE-2018-19318
PUBLISHED: 2018-11-16
SRCMS 3.0.0 allows CSRF via admin.php?m=Admin&c=manager&a=update to change the username and password of the super administrator account.