- Why ransomware attacks are spiking amid the COVID-19 pandemic.
- Know the top tips to avoid falling victim to darkweb attacks
- Know the dos and don’t of safe email practices.
Dubai: You think your network is “bomb-proof”? Or your organisation’s digital assets are “safe”? Think again. No matter how airtight you think work or organisation’s network is, there’s always a way in for the most persistent intruders. From the hackers’ point of view, we — the end users — are the best route of an hack. And this time, those who work from home are prized targets.
What’s the link between ransomware and pandemic?
Make no mistake: We are still in the midst of a health pandemic. And we’re also still in the midst of a digital pandemic of ransomware attacks. These are organised, deliberate attacks on increasingly significant targets. There are signs people and businesses are facing a chronic failure in finding ways to keep them at bay.
Why are ransomware attacks on the rise?
Ransomware attacks have spiked during the COVID-19 pandemic, say IT security professionals. “There’s one simple reason: More people are working away from the office, where security controls are comparatively weak,” said Anoop Kumar Pauval, Information Security Manager at Gulf News’ IT Department.
“At home, connected to work via remote data access, end-users tend to be less protected, and are more vulnerable,” Pauval added. He cited example, Check Point Research's (CPR) latest report (published in May) found a 102% increase in ransomware attacks this 2021 compared to the beginning of 2020. “There are no signs of the attacks slowing down.”
What’s the usual route of a ransomware attack?
Most ransomware attacks exploit the vulnerabilities of employees to get through to organisation’s network. Most hacks are done this way, called “social engineering” attacks.
How do links pose a threat?
Emails are the most potent tools in the arsenal of cybercriminals. It comes int he form of a link or an attachment. If you open an unknown attachment or click a link in an email sent to you by a hacker, you’re roped in.
How can you tell the difference between legit email and hacker’s email?
There are email senders among people you know. They tend to be safer, but that’s not to say you shouldn’t exercise caution (especially with forwards). Some spams are obvious, but others are very smartly designed get past past the filters. They’re done by deception masters designed to dupe recipients. “Phishing” email is No. 1 way hackers get around firewalls, filters and antivirus.
Should I always trust emails from a friend or colleague?
No, even if it’s from a friend or colleague, take a pause before clicking anything further. Check the contents of the message they send along with it: Does it sound like it’s from them? A smarter way to avoid malware or phishing is to call the sender or speak in person, if possible, to confirm they sent the email. If you can’t be sure of its authenticity, simply delete.
Top 5 biggest ransomeware payouts:
Why are ransomware very disruptive?
The threat is real, as can be seen by recent examples. There’s often a financial motive involved. The demands are also real, too. But the damage to operations can destroy an institution or organisation's reputation.
How much is the average ransomeware payment?
As we’ve seen, attacks capturing an organisation’s data and systems are on the rise. One study shows that since the start of the pandemic, ransomware attacks have gone up by almost 500%.
The average ransom payment has also continued to climb, up 43% from the last quarter of 2020 to an average of over $200,000, according to one report.
$200,000the average ransomware payout during Q1 2021
Worse, a ransom demand is often accompanied by a breach and extraction of company data — and a concurrent extortion threatening to release this data unless additional payments are made.
News about attacks against the CNA Financial and Colonial Pipelines are recent publicly-known examples of hacking events. There’s a much bigger section involving unknown pay-offs for which the victims never publicly declare the hack.
Who are the perpetrators?
They are evolving, from the stand-alone hackers to what are now known as “criminal collectives”, including the DarkSide, which behave like state-sponsored attackers. These collectives have created virtual organisations, sharpening their techniques in targeting specific sectors and companies. They patiently wait for the kills.
How big is the ‘cybercrime’ threat?
What’s the away around scams, spams and ransomware attacks.
It’s the dark underbelly of the online world. Cybercrime is a growing, highly successful and profitable “industry”. It is estimated that cybercrime costs will grow by 15% per year to reach $10.5 trillion by 2025. If it’s a country, it would be the world’s third-biggest “economy” — after those of the US States and China.
What’s the way around ransomware attacks?
Image when governments, health-care providers, online merchants like Amazon/ebay/Alibaba or other large organisations become beholden to cybercriminals? There’s certainly a way around the current state of affairs.
Intranets — closed, proprietary networks — might hold the key, say experts. As the internet evolves, a new trend emerges, with two distinct sides.
- Free-for-all internet:
This is the free-for-all, unfiltered, minimally regulated, “Wild West” type of internet anyone can access. This is the playground of the rising ranks of cybercriminals and everybody else, including you and me.
The second is “World Wide Intranet” — widely accessible but tightly controlled websites with stringent access controls to prevent criminal activity. Years ago, closed corporate intranets have gained popularity. This second type is rapidly evolving.
As such, as security measures and conditional access via multi-factor authentification will become a standard.
The internet needs a semblance of control — the price of not having them is immeasurably greater than the damage of any “restrictions”. It’s an inevitable outcome of the security threats mushrooming around us, compromising not only networks but individual the end users that use them.