Don’t Fall for Ransomware Scams, Even If They Do Speak to You without an Accent

Report this content

IT Connection by Paula Musich

Summary Bullets:

• Ask your anti-malware vendor what protections they provide against latest ransomware Trojans and what they can do to restore encrypted data.

• Make automated, frequent backups of critical data to offsite servers part of your defense in depth strategy.

There’s been a rise in the use of a particularly virulent form of ransomware attacks on the part of cybercriminals throughout 2012, and it’s likely that we’ll only see more and more of this in 2013. Even though threat researchers at Trend Micro claim that this is the work of a single cybercrime gang in Russia, the mounting publicity and success of this particular attack as it spreads across the globe will likely draw copycats into the mix. And although many of these scams target consumers, enterprises are also in the crosshairs of these attacks as well. For example, in one of these attacks, which seem to be based on the Reveton Trojan, cybercriminals are using sophisticated encryption techniques to hold sensitive files hostage. Once they’ve encrypted your data, only they have the encryption key necessary to decrypt the hostage files, and they use that to extort thousands of dollars from victims. One recent report highlighted how an Australian medical center had its patient database held for ransom, with the owners mulling whether to pay. A more recent ransomware attack impersonates local law enforcement and accuses the victim of committing a crime. The attack actually locks the victim’s computer and uses localized voice messages demanding verbally that the victim pay a (fake) fine. Meanwhile Trend Micro rival Symantec believes that there are up to 16 different families of ransomware, and that each one is controlled by a different cybercrime ring. It estimates that at least $5 million a year is being extorted from victims, and calls that number conservative. Read more of this post at http://bit.ly/YbTTJW

Media Contact:

Amee Singh
Sr. Director, Marketing Communications
pr@currentanalysis.com 

About IT Connection

IT Connection is the premier source of unbiased analysis and assessments of IT equipment and telecom services.  IT Connection provides easy-to-access, cost-effective, non-vendor-sponsored research to enterprise IT professionals.  The assessments on IT Connection allow you to quickly, easily, and efficiently assess suppliers, access side-by-side product comparisons, determine the best technology solution to fit your needs, and receive real-time updates and analysis on breaking market-changing events.  To join our community and interact with your peers and our analysts, visit us at www.currentanalysis.com/ITC.

About Current Analysis

Current Analysis (http://www.currentanalysis.com) has been helping leading telecommunications, information technology and business software companies improve their competitive intelligence, differentiate themselves in the market, and win more business. Current Analysis is the only provider of continuous, in-depth tactical competitive intelligence, analysis, and advice. For more than 15 years, sales teams, product managers, marketing professionals, and executives have relied on Current Analysis as a trusted partner to improve their ability to anticipate and quickly take action on market opportunities and competitive threats. The company serves more than 35,000 professionals at over 1,600 global enterprises.

Tags:

Quick facts

•Ask your anti-malware vendor what protections they provide against latest ransomware Trojans and what they can do to restore encrypted data.
Tweet this
Make automated, frequent backups of critical data to offsite servers part of your defense in depth strategy.
Tweet this