Let us be your IT department!
Call us Today! (703) 821-8200

Computerware

Computerware has been serving the Vienna area since 1976, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

Ransomware, in review:
First of all, it’s important to understand exactly what ransomware is. A form of malware, ransomware will infect your system and encrypt your data. It gets its name from the fact that the attacker will demand a ransom in order for your data to be decrypted. What’s worse, if you pay, you’re taking the distributor at their word that they will decrypt your data once the money has changed hands.

Understandably, this form of ransomware can be a highly potent weapon against many users, who simply won’t know how to handle the situation beyond paying and hoping for the best. Of course, since the motives behind ransomware are financial, a lot is directed towards business targets, as they not only have more funds available but are also heavily reliant on their data to function.

Ransomware repercussions
The nature of ransomware means that those that distribute it can usually name their price for the decryption key. After all, it isn’t as though victims have anywhere else to turn other than the hacker (or so the hackers want them to believe). Due to this, ransoms for encrypted data have shot up--in 2015, the ransom to decrypt an infected computer would cost about $294, on average. That price had jumped to average $1,077 per computer in 2016.

In addition to this increase in ransom demands, there was a 36 percent higher rate of ransomware attempts between 2015 and 2016, 68 percent targeting consumers. This left a still-considerable 32 percent being leveraged towards businesses.

Does it get worse? Sure does.
As if it wasn’t bad enough already, ransomware is now able to be utilized by just about anybody who has a grudge or a desire for some extra cash. Ransomware is now offered as-a-Service, allowing an attack to potentially come from far more sources than before. Some variants of ransomware, such as Karmen, will only cost an aspiring cyber criminal $175 to cash in on.

Thankfully, there are steps being taken to eliminate the threat of ransomware. For instance, there are decryption tools to help undo the damage that Karmen can cause because it was derived from the open-source ransomware project Hidden Tear. Other tools and resources are available to help identify which ransomware has infected a given system, like this one from security researcher Michael Gillespie.

However, there are also steps that you can take to avoid a ransomware infection, like following best security practices and computing mindfully. Computerware is here to assist you in putting these procedures in place, as well as helping you recover should ransomware strike. Give us a call at (703) 821-8200 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 23 August 2017
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Privacy Internet Cloud Business Management Microsoft Workplace Tips Managed Service Provider Software Productivity Backup Business Computing Hackers Data Saving Money Hardware Business Malware IT Support IT Services Email Hosted Solutions Google Quick Tips Smartphones Efficiency Gadgets Mobile Devices Business Continuity Small Business Disaster Recovery Mobile Office Virtualization Computer Network User Tips Microsoft Office Server Upgrade VoIP Social Media Network Security Windows 10 Miscellaneous Unified Threat Management Windows Mobile Device Management Smartphone Innovation WiFi Ransomware Vendor Management Passwords Operating System Remote Computing BYOD Communication The Internet of Things Marketing Mobile Computing Apps Android Remote Monitoring Users Firewall History Holiday Managed IT services Facebook Analytics Apple Collaboration Data Management IT Consultant Save Money Alert Content Filtering Health Outsourced IT Bring Your Own Device Office Automation Big data Tech Support Best Practice Going Green BDR Spam Wireless Technology Search Managed IT Services Phishing Hiring/Firing Virus Lithium-ion Battery App Hard Drives Windows 8 Budget Printer Information Technology IBM Outlook Gmail Productivity Browser Recovery Employer-Employee Relationship Phone System Help Desk Internet of Things Antivirus Encryption Humor Customer Service Education Saving Time Managed IT Save Time Data storage Money Administration Maintenance Running Cable SaaS Proactive IT Computers Bandwidth communications Tablet iPhone Business Intelligence Two-factor Authentication Networking Wireless Telephone Systems Data Backup Avoiding Downtime Website Document Management Travel Training Mobile Device Computer Repair Current Events Securty It Management Hacking IT Support Intranet Hard Drive Solid State Drive Office 365 Flexibility Update User Digital Payment Legal Government PowerPoint Social Networking Hosted Solution Word Risk Management Password Twitter Hacker Artificial Intelligence Fax Server Black Market Cloud Computing Presentation Net Neutrality Hack Company Culture Business Growth Virtual Desktop Telephony Monitors Documents Programming Heating/Cooling YouTube Settings Trending Pain Points End of Support Retail Public Cloud User Error Experience Excel Statistics Cybersecurity Law Enforcement Politics Gaming Console Mobility Streaming Media Automobile Inbound Marketing Webcam Laptop Safety Chrome How To Social Router Office Tips DDoS Network Congestion Computer Accessories Comparison Customer Relationship Management Paperless Office Taxes Sports Augmented Reality Computing Cybercrime Uninterrupted Power Supply Co-managed IT Text Messaging Robot Data Recovery IT service Cortana VPN Cost Management Compliance Processors Downtime Lifestyle USB IP Address Scalability Pirating Information Rental Service Adminstration Deep Learning Memory Human Resources Visible Light Communication VoIP External Harddrive Wi-Fi Consultation Meetings Cabling Content Management Private Cloud Skype Flash Advertising Smart Phones Administrator Get More Done Supercomputer Teamwork Printer Server Google Wallet Displays Worker Storage Machine Learning Video Surveillance Saving ZTime Unified Communications PDF LinkedIn Distributed Denial of Service Disaster Employer Employee Relationship Best Available Banking Drones Google Drive Keyboard Domains Licensing Archive Product Reviews Debate File Sharing Language Permissions Electricity eWaste Botnet Read Upselling Value Point of Contact Webinar Business Metrics Shortcut Writing switches Troubleshooting Thin CLient Staffing WannaCry Environment Computer Malfunction Chromebook Time Management Competition Business Owner Messenger Best Practives Leadership Work/Life Balance Cryptocurrency Motion Sickness Tracking Download Google Docs Touchscreen Application IT consulting Windows 10 Specifications Microserver Device Management Books Cleaning Digital Web Server CIO Workers Digital Signature Microchip Websites Regulations Windows XP Start Menu Entertainment online Currency Turn Key Reading Trojan Society Access Samsung Organize Hacks Micrsooft Software as a Service G Suite Analytic Mouse Relocation Identity Theft Spyware Physical Security Public Speaking Tablets Notifications GPS Data Protection Sync Reliable Computing Virtual Reality Music cache Entrepreneur CCTV Google Maps HIPAA Business Managemenet Ebay Social Engineering 3D Upgrades Bluetooth LiFi Corporate Profile Electronic Payment In Internet of Things Recycling Computing Infrastructure Assessment Harddrive Emails Capital Productuvuty CrashOverride 3D Printing

hp supplies medallionLarge2017