Cyber SecurityPersonal SecuritySecurity Culture

How Ransomware Hackers Sneak Into Your Systems?

According to global investigations firm Kroll, ransomware hackers have caused the most security issues in 2020. One in three cyberattack cases has been due to ransomware till September of this year. 47 percent of them used remote desktop protocol (RDP), a standard that helps remote teams work from home. What are the other ways that ransomware hackers can infiltrate your company safety net? In this article at ZDNet, Steve Ranger shares how the cybercriminals can sneak into your corporate systems.

Tracing Ransomware Hackers

Ransomware attacks were more common in sectors like manufacturing, professional services, and government. Almost 35 percent of the hacks were caused by the ransomware derivatives Ryuk, Sodinokibi, and Maze. The rest 26 percent of the attacks were phishing emails, and 17 percent targeted specific vulnerabilities.

More About the Threats

Ransomware hackers go quiet after an attack to update their attack variants. Nonetheless, 42 percent of these cybercriminals download parts of the data and threaten to publish sensitive information. After the first ransom payment, some even ask for a second round of payment before deleting the data. Maze ransomware hackers claim to have stolen data from non-victims and redirected their attacks on partners and clients. In another cyberattack case, the gang threatened to leak patient data by directly emailing the victims.

32 percent of the ransomware hackers used business email compromise (BEC) to harass people. Head of incident response at Kroll North America Devon Ackerman warns that cybercriminals are using the coronavirus crisis to increase their attack vector. So, cybersecurity should be the top priority for CIOs.

The ‘best way’ to block the ransomware hackers from infiltrating your company systems is by making it challenging for them to intrude. Prevent needless RDP access, mandate two-factor authorization, update tools and applications, and train your employees.

To view the original article, visit the following link:

Related Articles

Back to top button

We use cookies on our website

We use cookies to give you the best user experience. Please confirm, if you accept our tracking cookies. You can also decline the tracking, so you can continue to visit our website without any data sent to third party services.