This Week's Top Stories About Ransonware Attack on Data

This Week's Top Stories About Ransonware Attack on Data

Ransomware attacks have become a scourge - and this is an understatement. Just a few days back, around Diwali 2022, Tata Power got hit by a ransomware attack, and stolen data got leaked. It is estimated that there were 714 million ransomware attacks around the world in 2021. In 2017, the WannaCry ransomware infected nearly 250,000 computers in a single day. In fact, groups like Hive, have innovated and come up with RaaS (Ransomware as A Service), where 3rd parties can use their infrastructure to run ransomware attacks.

So, what is Ransomware? It is a kind of malware that encrypts computer hard drives and folders and often steals data before encrypting. The attacker leaves a note on the target computer asking for payment via a dark-web portal, usually in bitcoin. If this ransom is not paid, the attacker does not reveal the cryptographic keys required to decrypt the data, and also threatens to release stolen data on the dark web. Needless to say, this can cause major losses to any company or organization.

How is Ransomware delivered? The most common modus operandi of attackers is to send malicious attachments in emails. When users download those attachments, the ransomware software starts running and quickly takes over the affected computer. Then it latches onto LAN networks, Insecure Microsoft Exchange servers, and Remote Desktop servers and spreads all over the organization’s IT infrastructure - end-user PCs as well as servers. Social Engineering, Phishing, and operating system exploits are also common routes for delivering ransomware. While Windows PCs and Servers remain at the highest risk, Ransomware attacks on Linux and Mac computers are also increasingly common.?

It is almost impossible to be 100% safe from ransomware, however, the below practices will reduce the chances of an attack affecting your organization:

  • Education & Awareness: It is extremely important to educate users on security best practices, to identify phishing and malicious emails. Remember, human errors are responsible for 82% of data breaches.?
  • Maintain & Update Software: You must keep PCs and Servers patched with the latest security patches. In particular, anti-malware and antivirus software must be kept up to date at all times.
  • Use the Cloud: Instead of using an on-premise email server, use a cloud email service. Instead of using a LAN share drive, use a service like EisenVault for storing important documents securely in the cloud. If user PCs are encrypted, the documents and email are still accessible via the cloud and work doesn’t stop.
  • Backup, Backup, Backup: Take regular backups of your user PCs and Servers. We have seen customers backing up their servers to another hard disk within the same PC! This is bad practice. The backup should be at least on a separate disk, which is not always attached to the machine in question. Even better, if the backup is taken to a separate server with a different OS and in a different physical location.

We at EisenVault are experts in managing documents in the cloud. Cloud document storage should be a key part of your data security and business continuity strategies. Click here to know more about how we keep your documents safe in the cloud.


Vivek Goyal

COO & Co-founder at LdotR

2 年

Absolutely on point. Ransomware and other digital threats will only increase as the internet penetration rises but the education and maturity of the users does not. In most cases the damage from these threats can be contained with proactive measures and user education. Your cybersecurity is only as strong as the weakest link (users/system).

Vipul Swarup

Co-Founder @ EisenVault & GAO Farm | MBA, B.E.

2 年

Curious to see what other people's experience has been with using the cloud to stay safe during a ransomware attack.

要查看或添加评论,请登录

EisenVault的更多文章

社区洞察

其他会员也浏览了