Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
With $325 Million In Extorted Payments CryptoWall 3 Highlights Ransomware Threat
Newest First  |  Oldest First  |  Threaded View
theb0x
100%
0%
theb0x,
User Rank: Ninja
11/4/2015 | 3:03:56 PM
Re: Back up your data!
There is a more simpler solution to protecting your data other than just backups.

Encrypt your data. CryptoWall can't encrypt files that are already encrypted by the end user.

The data can be decrypted on access which would lock the files currently opened. When the file is closed it is

automatically re-encrypted in realtime. As an extra layer of security it is also possible to encrypt volume shadow

copies of the files as the behavior of CryptoWall will automatically sdelete (Secure Delete) all shadow copy data

on the infected machine. I am no way suggesting not to backup your data. However, a proper retention policy

should also be correctly set to seven or more days. If a backup whether it be to a local, network drive, or cloud

based is not encrypted there remains the risk of the files being encrypted by the ransomware and changes of

modified files by CryptoWall propagating and overwriting the original backup of end user data. Also, CrytoWall

only affects files by extention (ie .docx, .qbw, .xlsx) If a file extention is modified to something completely

obscure in no relation with any application they will remain unaffected by this ransomware. 
SgS125
50%
50%
SgS125,
User Rank: Ninja
11/2/2015 | 10:51:53 AM
accuracy of amount in question?
According to Howard, the researchers were able to track $325 million in ransom payments through the Bitcoin system. "Our estimate is conservatively low. We think it could easily be double that number but did not have the direct evidence to claim it."

 

So really you could say that is was only half as much with just as much confidence?

I often wonder where the numbers for this come from,  a guess may not be very newsworthy.

What evidence is there to prove it one way or another?
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
10/31/2015 | 5:00:34 PM
Enterprise Level
How prevalent is Ransomware at the enterprise level with network drives? Are they affected in the same way a regular endpoint will be?
RyanSepe
100%
0%
RyanSepe,
User Rank: Ninja
10/31/2015 | 4:59:14 PM
Back up your data!
Please people, perform due diligence and don't let ransomware cripple us. Back up your data to a another source regularly. Make sure your OS has default backup settings enabled such as Windows "Previous Versions". This could save tons of money and headaches.


97% of Americans Can't Ace a Basic Security Test
Steve Zurier, Contributing Writer,  5/20/2019
How Security Vendors Can Address the Cybersecurity Talent Shortage
Rob Rashotte, VP of Global Training and Technical Field Enablement at Fortinet,  5/24/2019
TeamViewer Admits Breach from 2016
Dark Reading Staff 5/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-7068
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7069
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have a type confusion vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7070
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .
CVE-2019-7071
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
CVE-2019-7072
PUBLISHED: 2019-05-24
Adobe Acrobat and Reader versions 2019.010.20069 and earlier, 2019.010.20069 and earlier, 2017.011.30113 and earlier version, and 2015.006.30464 and earlier have an use after free vulnerability. Successful exploitation could lead to arbitrary code execution .