Our threat landscape continues to expand and cyber criminals have discovered that the encryption of data followed by a ransom fee can be a highly lucrative business. While many companies recognize the serious threat posed by ransomware, many still continue to go conduct business without a multi-layered security solution in place to ward off malicious attacks.

Here are a few facts about Ransomware that you know not know: 


Ransomware Bribe Equal to One Car Payment

Ransomware is malware that encrypts files & deletes the original files, thus making the files inaccessible unless a ransom is paid. While the cost to decrypt a drive attacked by ransomware may vary, the average cost is around $500. And according to Edmunds, the average monthly car payment is $483. This is a great comparison as to how much consumers are willing to pay to get control back over their devices.

Ransomware Cashing in More than Security Firms Sell for 

According to researchers at Bromium, the prevalence of malware nearly doubled in 2015 simply because the profits earned by criminals is too easy to pass up. One type of ransomware, Cryptowall 3.0, made over $325 million from US victims alone in 2015. Even more astonishing, iSight Partners was bought in January 2015 for only $200 million. It’s no surprise why these criminals continue to do the harm that they’re doing when the profits are even more than what major technologies firms are selling for on the market.

Flash to Blame for Ransomware Success 

Ransomware attacks are getting more stealthy and attackers are becoming increasingly better organized, leveraging multiple forms of user manipulation. This malware can also be delivered by exploit kits on compromised web pages and malicious sites. Once a user visits a compromised web page serving exploit kit code, the code then tried to identify potential vulnerabilities on the user’s system and serves exploits accordingly. Much of ransomware's growth can be directed correlated with the success of exploit kits like Angler, the top exploit kit on the market today. Cisco reports that 60% of Angler payouts are in response to ransomware. Much of Anglers success has been tied to their successful exploitation of Adobe Flash. In fact, eight out of ten vulnerabilities used by exploit kits in 2015 were Flash related.

Malvertising Fuels Ransomware

In 2015, malvertising gained popularity amongst cyber criminals as a common method for ransomware distribution, falling just behind that of phishing scams. This means of attack can strike at any time and is often placed into click-baiting articles on popular websites. Essentially, a user clicks on a video, article, etc., and suddenly becomes confronted with a screen stating all your files, photos, and encrypted data have been one-way encrypted and will be held ransom until a ransom fee is paid.

The Cloud Won't Save You from Attack

If you think storing your data in the cloud will save you from a ransomware attack, you’re sadly mistaken. In fact, it’s been found to be rather easy for ransomware to hit cloud drives mapped to local machines. The shared cloud drive can often make matters worse since one phishing incident can lead to the unauthorized encryption of thousands of files used across your entire IT environment.  

Cloud service providers like Microsoft Azure and Google Cloud have already become victims of these attacks as fraudsters register an immense number of free, trial accounts and use their computation infrastructure to conduct cyber-attacks. According to DataVisor, “Cloud allows cyber-attackers to significantly increase the number of attack campaigns they can conduct, attributed to the elasticity and compute capacity of these services, and allows them to easily hide behind legitimate network sources and thus remain anonymous.”

Cyber Extortion- The Latest Wave of Ransomware

While many ransomware attacks are strategically targeted, many are simply the product of opportunism- taking advantage of an organizations' poor cyber security posture. Criminals are starting to focus on the psychology behind each attack while using fear as the ultimate driving force. The latest version of CryptoWall has upped the ante by threatening to not only leave users without access to their data but also to publish the data publicly if they don’t pay the ransom fee. These attackers have one goal in mind: shaming its target, like the Ashley Madison breach in late 2015.


NNT's Recommendations and Mitigation Techniques

As cyber-attacks continue growing at an unprecedented rate, it’s time for all organizations dealing with sensitive data to really reflect on what can be done to ensure their digital doors are secure from hackers. 

The phishing attack is one of the easiest ways a hacker can infiltrate your IT system so user education, SPAM blockers, anti-virus tools, and other security applications can help prevent employees from falling victim to a phishing attack.

With anti-virus tools only covering the bare surface, it’s important to implement a layered security approach to your IT estate. By working with NNT, your organization will be able to adopt a ‘layered and integrated approach’ to security that incorporates the right process, methodology and set of tools in order to guard your IT environment against today’s ever-evolving threat landscape.

With NNT's Change Tracker Gen7, your organization will come equipped with intelligent file integrity monitoring, compliance management, system hardening, threat intelligence & security configuration management all powered by Intelligent Closed-Loop Intelligent Change Control, all working to make your IT estate as secure and compliant as possible. 


Request The FREE NNT Ransomware Mitigation Kit


Read this article on Dark Reading

The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

Corporate Headquarters

6160 Warren Parkway, Suite 100
Frisco, Texas, 75034

Phone 1: 1-949-407-5125

Phone 2: 888-638-9749 (toll-free)

[email protected]

United Kingdom

5 New Street Square
London EC4A 3TW

Phone: +44 (0) 203 588 3023

 [email protected]
SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2024, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.