Genel

RANSOMWARE ATTACKS ARE ON THE RISE DURING COVID-19

0 16

As of the start of 2020, ransomware attacks are on the rise during COVID-19 Because of the unfortunate situations, organizations are more willing to pay the ransom to decrypt their files.

Since ransomware attacks are on the rise during COVID-19, we can clearly see that attackers are getting more shameless when it comes to reaching their goals. What’s more surprising is that ransomware attacks during COVID-19 have mostly affected organizations trying to fight the virus. Health care has been affected more than any other sector during COVID-19. The attacks on the industry constituted 29% of the attacks.

1- What tactics attackers use on ransomware attacks during COVID-19?

Attackers usually use malware. By using the weak spots in organizations’ systems, they encrypt or cut off access to data, machines, and systems. The attackers demand money from the organization in order to decrypt the files or give back access. They generally demand cryptocurrency such as Bitcoin as it is hard to track.

During COVID-19 to get into the organization’s systems, attackers use:

  • Email attachments that contain important or urgent in the description.
  • Browsers.
  • Fake voice message notifications from media platforms.
  • Services that include wireless connectivity and remote control.
  • Services that include wireless connectivity and remote control.
  • Media platforms that are removable and private equipments.

Attackers generally exploit weaknesses in the software or perhaps other underlying hardware that can trigger the encryption.

2- Why is it important that ransomware attacks are on the rise during COVID-19?

It is important that ransomware attacks are on the rise during COVID-19 because the attacks cause drastic and substantial results. This may involve market damage, loss of money, and damage to credibility for the organization. For some, it can even lead to the company being shut down. Because of the attack, personal information, or even sensitive data can become unreachable or dangerous people may gain access to it.

Authorities enforce some basic control mechanisms in order to avoid the rise of ransomware attacks during COVID-19. Implementing effective operational and technological steps is essential to avoid data breaches. Because of the breaches, the companies can’t recover stolen information. This way, the organization avoids lost or destroyed data. Lack of control mechanisms could mean that the company has breached the law.

In case of a data violation, the company has to inform the regulator in no more than 72 hours, but only if a breach of personal information is likely to lead to individuals getting harmed. If the breach is dangerous, the company also has to inform the individuals whose information is stolen immediately.

Here are the minor situations different from ransomware attacks during COVID-19. There are situations where the company doesn’t need to inform others about, if:

  • the data loss is not permanent.
  • the company can prove that the information has not been obtained or exploited.
  • the company has backed up the stolen data and the data is retrievable.

Some companies suggested that since the information is still in their reach, there was no violation of the data. This is a small possibility. The authorities say that even if the company was able to recover the backed up data, they also need to check whether or not the company implemented the basic control mechanisms that could help avoid the breach.

Financial penalties as well as other disciplinary measures may also be taken for failure to inform the violation of personal information and for failure to comply entirely with the data security measures. If the violation has affected people from various backgrounds, it could result in penalties from several authorities in various countries.

3- What is the best protection against ransomware?

1. Test your staff with simulated phishing tests!

Phishing is becoming a major threat to consumers and businesses around the world, and phishing attacks are increasing significantly. According to the reports, phishing will be the number 1 cyber threat to the companies by 2020. Our brilliant phishing simulation module allows you to monitor and analyze human activities in your organization safely and intelligently by testing your staff with sudden phishing attacks, monitoring their behaviors and providing information to you.

2. Educate your employees with cyber security awareness training!

The most realistic approach to defend your business is to educate your personnel on how to detect and track cyber threats through cyber security awareness training. Poorly trained and careless individuals will disclose valuable information to the attackers. Raise your employees’ cyber security awareness using our security training.

3. Test your technologies with email security gap analysis tools!

The effect of successful spear phishing is 95 percent of all cyberattacks on corporate networks. Using simulation to replicate the attack mechanisms affecting organizations through mail servers, our email security gap analysis tool periodically checks your technology (like firewalls, anti-virus and anti-spam). The findings help you to find vulnerabilities in the software and efficiently and effectively take the appropriate steps before you are targeted.

“This post is originally published at www.phishing.org.uk”

RSS Teknoloji Haberleri