Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
SMBs Paid $301 Million to Ransomware Attackers
Threaded  |  Newest First  |  Oldest First
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
9/22/2017 | 7:20:51 AM
Backups
Seems like SMB's are moving in the right direction. But $300 million is still a hefty sum. This metrics is perfect to make a case towards a robust backup platform. (With test backup processes)
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/22/2017 | 8:19:53 AM
Re: Backups
SMB is generally support by a managed services firm or often a local self-employed consultant and I have looked at my past support protocols --- SHOCKED at some of them with what I have learned recently.  My backups were good and tested.  Whew.  But in other areas I stand in shame.  Your support entity HAS to be responsible for these issues and I now that should be a LEGAL requirement as well!!!

Ever since i joined a malware forensics team in Georgia, i am astonished some of my clients lasted as long as they did!!!  
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:49:47 PM
Re: Backups
SMB is generally support by a managed services firm That is true, they mainly take care of basic stuff and ask for more if more security is needed.
LouiseMiller
50%
50%
LouiseMiller,
User Rank: Apprentice
10/10/2017 | 9:14:31 AM
Re: Backups
So what does it mean? 
LouiseMiller
50%
50%
LouiseMiller,
User Rank: Apprentice
7/3/2018 | 5:06:45 AM
Re: Backups

Hi! My name is Louise Miller - a copywriter, a rewriter, an optimizer, a seller of services and goods through an effective advertising syllable, a delicate psychologist of purchasing souls who has many years of experience in business and trade.

In other words: I write texts! Clear and simple texts for websites, easily and with pleasure read (at least I try to make them exactly so). But this does not mean that I can not rewrite any scientific work. This is a unique content of information and advertising nature, written for people in an accessible and understandable language and simultaneously well perceived by search engines.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:53:21 PM
Re: Backups
My backups were good and tested That is good, unless backup is verified it is not that problem-proof. If current files are encrypted , backups might be encrypted too.
REISEN1955
50%
50%
REISEN1955,
User Rank: Ninja
9/26/2017 | 2:59:22 PM
Re: Backups
They have to be catalog backups, every 24 hours and not to over-write old data otherwise the next cycle just backs up encrypted files from "now" instead of good files from "then."  I am proud that a 501C3 that got wrecked by Crypotlocker in 2014, under rmy care, had 98% of workstation and server data TOTALLY RESTORED within 3 hours the next business day.  I  maintained proper OFFSITE, CATALOG storage and it worked. 
ROMAN45
0%
100%
ROMAN45,
User Rank: Apprentice
9/27/2017 | 2:48:30 AM
Re: Backups
I heard that SMB is by and large help by an oversaw benefits firm" That is valid, they predominantly deal with fundamental stuff and request progressively if greater security is required.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:54:27 PM
Re: Backups
Ever since i joined a malware forensics team in Georgia Agree. It is a good idea to be part of an organization that we can get constant current updates on the issues.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:46:35 PM
Re: Backups
This metrics is perfect to make a case towards a robust backup platform Agree. Backups is critical, they need to go beyond that and avoid any downtime,
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2017 | 2:45:33 PM
Ransomware
Ransomware is a lucrative business today. There is no surprise that there will be more of it next two years. Businesses need to get ahead of it.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
How Enterprises are Attacking the Cybersecurity Problem
Concerns over supply chain vulnerabilities and attack visibility drove some significant changes in enterprise cybersecurity strategies over the past year. Dark Reading's 2021 Strategic Security Survey showed that many organizations are staying the course regarding the use of a mix of attack prevention and threat detection technologies and practices for dealing with cyber threats.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-42258
PUBLISHED: 2021-10-22
BQE BillQuick Web Suite 2018 through 2021 before 22.0.9.1 allows SQL injection for unauthenticated remote code execution, as exploited in the wild in October 2021 for ransomware installation. SQL injection can, for example, use the txtID (aka username) parameter. Successful exploitation can include ...
CVE-2020-28968
PUBLISHED: 2021-10-22
Draytek VigorAP 1000C contains a stored cross-site scripting (XSS) vulnerability in the RADIUS Setting - RADIUS Server Configuration module. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload in the username input field.
CVE-2020-28969
PUBLISHED: 2021-10-22
Aplioxio PDF ShapingUp 5.0.0.139 contains a buffer overflow which allows attackers to cause a denial of service (DoS) via a crafted PDF file.
CVE-2020-36485
PUBLISHED: 2021-10-22
Portable Ltd Playable v9.18 was discovered to contain an arbitrary file upload vulnerability in the filename parameter of the upload module. This vulnerability allows attackers to execute arbitrary code via a crafted JPEG file.
CVE-2020-36486
PUBLISHED: 2021-10-22
Swift File Transfer Mobile v1.1.2 and below was discovered to contain a cross-site scripting (XSS) vulnerability via the 'path' parameter of the 'list' and 'download' exception-handling.