Apex IT Group

Ransomware Getting Much More Targeted

Ransomware has now been a major threat to businesses and other organizations for a couple of years, and 2018 is no different. For those who don’t know, ransomware is a form of malicious software (malware) that threatens the elimination of hijacked and encrypted data if a user doesn’t pay a ransom. It is known to be one of the most prolific and pervasive threats seen on the Internet today. We will take a look at how ransomware has evolved over the past several years, what the future of ransomware looks like, and what you can do to protect yourself against it.

Ransomware
Unlike most other malware threats, ransomware isn’t designed to gain access to a system to steal data. It’s also not really a con, as anyone that is inundated with ransomware is in a real threat to lose their data (or their money). Ransomware is basically one of two types of malware. Some are computer viruses that target the CPU. These are called “locker” ransomware. The other prevalent type, called “crypto” ransomware, target and encrypt access to file systems.

Whichever strand you get (and there are dozens of different strands) the basic premise is the same. After it is unpackaged to the user’s machine (or network) it encrypts access to data/processing/both and gives the system’s user instructions on how to proceed. The user then has a decision to make, pay the ransom or try to restore the data from their backup platform.

Ransomware is such a departure from normal malware in that most strands of malware tries to camouflage itself inside a user’s system or network. Ransomware makes sure you know it’s there. The past few years has seen a huge uptick in the amount of ransomware that has been deployed, both in variant, and in frequency. These attacks have hit many municipalities, businesses, and other organizations, with one purpose, to extort money.

With the litany of ransomware attacks conducted on very public forums, it has led people to start to ask, “How are these attacks carried out?” The answer may surprise you.

Delivery
You may think that such a devastating computer virus would have to be delivered by those black hat hackers who sit in a basement someplace carrying out some well-concocted scheme to defraud your company. Or maybe it’s sabotage by a disgruntled former worker who didn’t get his/her 25% raise and inexplicably still had access to the network. The truth is that, while it could be either one of those examples, it is most likely the result of an honest act of negligence by someone who has access to your network.

The majority of ransomware attacks are perpetrated by hackers that try to spoof legitimate company’s emails. Since these emails seem to be coming from a legitimate place, unwitting end-users click on links or download attachments from these emails, resulting in the malware attached being deployed on the system. The code then goes to work encrypting files or the hard drive.

User View (and What They Don’t See)
Once the ransomware has inundated the system and the file (or drive) is encrypted, the server will send a message to the victim. Typically, the user will get a notice that their files/computer has been encrypted and the only way to get the file back is to follow the instructions given in the notice. This includes payment arrangements and the dreaded countdown meter. If the user doesn’t meet the demands outlined in the notice, their data will be deleted forever, or their computer will be locked. This, of course is a terrible situation.

What the user doesn’t see, however, is that the hacker, who has control over this data or infrastructure is probably not letting this end-user off the hook. The ransomware is bad enough, to exacerbate things for this foolish user, the hacker can now do what they please with that machine. Sometimes they will include directions that will allow the hacker to steal the victim’s credentials. Even if the ransom is paid, and the files/system is returned to user as agreed upon, many of these attackers will load additional malware onto the system, allowing them to further persecute a person whose only mistake was clicking on a link they thought was a legitimate source.

How to Avoid Ransomware
Firstly, it is important to have enough security on your machine/network to ensure that any potential threat is eliminated before it can be a problem. A Unified Threat Management tool is a great solution to mitigate network problems. Not only does it have a firewall and antivirus, it comes with a spam filter that can help users from being exposed to emails rife with malware in the first place.

Secondly, training your staff on how to determine the legitimacy of any message is important. Ransomware can be deployed through email, messaging services, and social media, so educating them on how to avoid these situations is an integral step in keeping these threats off of your organization’s network.

Lastly, having a powerful and up-to-date backup of your organization’s data can be a life-saver in situations like the one outlined above. Apex IT Group’s BDR provides any organization the data protection they need through redundancy. Not only is your data backed up at regular intervals locally, it is also backed up in an offsite data center. Having up-to-date backups on hand could save your hide in several different situations.

For more information about ransomware, what you have to do to keep from experiencing it, and how to protect yourself from all manners of online threats, call us today at 877.799.APEX.

Close Menu

CUSTOMER CENTER

LIVE SUPPORT

To submit a support ticket online click on the ‘Client Login’ button on the right or Click Here.

Service Desk Hours of Operation:

Monday to Friday:
8:00 a.m – 6:00 p.m. EST

EMERGENCY SERVICE
& SUPPORT

Calls after 6:00 p.m. Monday through Friday, and on weekends and holidays, will be answered by our dispatch team. We will take your information, and then contact the on-call Service Engineer via phone and e-mail to begin resolving your service request.

CONTACT INFORMATION

Office Address:
525 Fellowship Road, Suite 300
Mount Laurel, NJ 08054

Sales: (877) 799-APEX (2739)
Fax: (866) 253-2690

COVID-19

MESSAGE FROM OUR CEO

Dear Valued Business Partner of Apex IT Group: I am writing to inform you that our teams are working around the clock to engage emergency response plans in order to operate in a safe, healthy and efficient manner to support the collateral impact of the COVID-19 pandemic situation.