Let us be your IT department!
Call us Today! (703) 821-8200




Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

Ransomware, in review:
First of all, it’s important to understand exactly what ransomware is. A form of malware, ransomware will infect your system and encrypt your data. It gets its name from the fact that the attacker will demand a ransom in order for your data to be decrypted. What’s worse, if you pay, you’re taking the distributor at their word that they will decrypt your data once the money has changed hands.

Understandably, this form of ransomware can be a highly potent weapon against many users, who simply won’t know how to handle the situation beyond paying and hoping for the best. Of course, since the motives behind ransomware are financial, a lot is directed towards business targets, as they not only have more funds available but are also heavily reliant on their data to function.

Ransomware repercussions
The nature of ransomware means that those that distribute it can usually name their price for the decryption key. After all, it isn’t as though victims have anywhere else to turn other than the hacker (or so the hackers want them to believe). Due to this, ransoms for encrypted data have shot up--in 2015, the ransom to decrypt an infected computer would cost about $294, on average. That price had jumped to average $1,077 per computer in 2016.

In addition to this increase in ransom demands, there was a 36 percent higher rate of ransomware attempts between 2015 and 2016, 68 percent targeting consumers. This left a still-considerable 32 percent being leveraged towards businesses.

Does it get worse? Sure does.
As if it wasn’t bad enough already, ransomware is now able to be utilized by just about anybody who has a grudge or a desire for some extra cash. Ransomware is now offered as-a-Service, allowing an attack to potentially come from far more sources than before. Some variants of ransomware, such as Karmen, will only cost an aspiring cyber criminal $175 to cash in on.

Thankfully, there are steps being taken to eliminate the threat of ransomware. For instance, there are decryption tools to help undo the damage that Karmen can cause because it was derived from the open-source ransomware project Hidden Tear. Other tools and resources are available to help identify which ransomware has infected a given system, like this one from security researcher Michael Gillespie.

However, there are also steps that you can take to avoid a ransomware infection, like following best security practices and computing mindfully. Computerware is here to assist you in putting these procedures in place, as well as helping you recover should ransomware strike. Give us a call at (703) 821-8200 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Tuesday, 27 June 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Business Computing Backup Hackers Saving Money Hardware Data Business Malware Hosted Solutions IT Services IT Support Email Quick Tips Smartphones Gadgets Google Mobile Devices Efficiency Small Business Mobile Office Disaster Recovery Virtualization Business Continuity Microsoft Office Computer Network User Tips Server Miscellaneous Upgrade Social Media Network Security VoIP Windows 10 Mobile Device Management Unified Threat Management Windows Innovation BYOD Communication Smartphone WiFi Operating System Passwords Mobile Computing Marketing Ransomware Apps The Internet of Things Vendor Management Remote Computing Firewall Android Managed IT services Users History Holiday Apple Collaboration Remote Monitoring Facebook Analytics IT Consultant Alert Save Money Content Filtering Data Management Automation Bring Your Own Device Health Office Big data Lithium-ion Battery Hard Drives App Windows 8 Best Practice Hiring/Firing Going Green Tech Support Wireless Technology Outlook Budget Virus Phone System Outsourced IT Information Technology Phishing BDR Spam IBM Printer Gmail Productivity Browser Employer-Employee Relationship Search Internet of Things Administration Maintenance Customer Service Proactive IT Help Desk Computers Education Save Time Data storage Money Managed IT Services Humor Running Cable Saving Time Bandwidth Hacker communications Black Market Digital Payment Encryption Tablet Telephone Systems Networking Training Two-factor Authentication PowerPoint Wireless Social Networking Travel Website Antivirus Twitter Managed IT Artificial Intelligence Hacking IT Support Hard Drive Solid State Drive iPhone Fax Server Business Intelligence Flexibility Office 365 Legal User Document Management Mobile Device Computer Repair Avoiding Downtime Government Recovery Intranet SaaS Current Events Hosted Solution Risk Management Update Cost Management Compliance Gaming Console Chrome Downtime Processors USB Router Webcam Presentation Cloud Computing Company Culture Computer Accessories Customer Relationship Management Virtual Desktop Hack Business Growth Comparison Augmented Reality Monitors Settings Documents Programming Heating/Cooling YouTube Text Messaging VPN Politics End of Support Retail Public Cloud Co-managed IT Experience Law Enforcement Cybersecurity Net Neutrality Lifestyle Automobile Laptop Safety Paperless Office Social How To Office Tips Computing Network Congestion DDoS Statistics Sports Taxes Pain Points IT service Cybercrime Uninterrupted Power Supply Word User Error Streaming Media Excel Robot Password Inbound Marketing Cortana Leadership Data Protection Computing Infrastructure Entrepreneur Sync Music Business Managemenet Rental Service CCTV Upgrades HIPAA Google Maps Memory Electronic Payment LiFi Device Management Corporate Profile Wi-Fi In Internet of Things Best Practives Telephony IP Address Emails Deep Learning Flash online Currency Visible Light Communication Human Resources VoIP Microserver Skype Meetings Cabling Private Cloud Advertising Mouse Electricity Banking Administrator Turn Key Google Wallet Teamwork Trojan GPS File Sharing Supercomputer Displays Storage Worker Language PDF Machine Learning Organize Unified Communications WannaCry Business Metrics Keyboard Distributed Denial of Service Drones Best Available Disaster Product Reviews Ebay 3D Domains Employer Employee Relationship Licensing eWaste Permissions Read Recycling Digital Chromebook Shortcut Botnet Value Securty switches Pirating Information Adminstration Messenger Writing Troubleshooting Staffing Work/Life Balance Environment Access Download Competition Computer Malfunction Business Owner Content Management Books Mobility Harddrive Cryptocurrency Spyware Microchip Application Motion Sickness External Harddrive Google Docs Regulations Specifications IT consulting Video Surveillance Reading Tracking Windows 10 LinkedIn Cleaning Trending Saving ZTime Get More Done CIO Hacks Web Server Smart Phones Digital Signature Entertainment Printer Server Archive Windows XP Debate Relocation Workers Start Menu Identity Theft Society Point of Contact Notifications Micrsooft Analytic Reliable Computing Samsung Thin CLient Virtual Reality G Suite Social Engineering Public Speaking Physical Security Tablets Upselling Bluetooth Webinar Scalability

hp supplies medallionLarge2017