Comments
SMBs Paid $301 Million to Ransomware Attackers
Newest First  |  Oldest First  |  Threaded View
LouiseMiller
50%
50%
LouiseMiller,
User Rank: Apprentice
10/10/2017 | 9:14:31 AM
Re: Backups
So what does it mean? 
ROMAN45
50%
50%
ROMAN45,
User Rank: Apprentice
9/27/2017 | 2:48:30 AM
Re: Backups
I heard that SMB is by and large help by an oversaw benefits firm" That is valid, they predominantly deal with fundamental stuff and request progressively if greater security is required.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/26/2017 | 2:59:22 PM
Re: Backups
They have to be catalog backups, every 24 hours and not to over-write old data otherwise the next cycle just backs up encrypted files from "now" instead of good files from "then."  I am proud that a 501C3 that got wrecked by Crypotlocker in 2014, under rmy care, had 98% of workstation and server data TOTALLY RESTORED within 3 hours the next business day.  I  maintained proper OFFSITE, CATALOG storage and it worked. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:54:27 PM
Re: Backups
Ever since i joined a malware forensics team in Georgia Agree. It is a good idea to be part of an organization that we can get constant current updates on the issues.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:53:21 PM
Re: Backups
My backups were good and tested That is good, unless backup is verified it is not that problem-proof. If current files are encrypted , backups might be encrypted too.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:49:47 PM
Re: Backups
SMB is generally support by a managed services firm That is true, they mainly take care of basic stuff and ask for more if more security is needed.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:46:35 PM
Re: Backups
This metrics is perfect to make a case towards a robust backup platform Agree. Backups is critical, they need to go beyond that and avoid any downtime,
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:45:33 PM
Ransomware
Ransomware is a lucrative business today. There is no surprise that there will be more of it next two years. Businesses need to get ahead of it.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/22/2017 | 8:19:53 AM
Re: Backups
SMB is generally support by a managed services firm or often a local self-employed consultant and I have looked at my past support protocols --- SHOCKED at some of them with what I have learned recently.  My backups were good and tested.  Whew.  But in other areas I stand in shame.  Your support entity HAS to be responsible for these issues and I now that should be a LEGAL requirement as well!!!

Ever since i joined a malware forensics team in Georgia, i am astonished some of my clients lasted as long as they did!!!  
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/22/2017 | 7:20:51 AM
Backups
Seems like SMB's are moving in the right direction. But $300 million is still a hefty sum. This metrics is perfect to make a case towards a robust backup platform. (With test backup processes)


'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.