• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Home Featured

As Ransomware Threats Continue To Evolve, Containing Attacks Before They Escalate Is A Must

Contributor by Contributor
September 9, 2021
in Featured, Security
Share on FacebookShare on Twitter

“That’s a nice business you’ve got. It would be a shame if anything was to happen to it!” That, in a nutshell, is the classic gangster’s extortion pitch: fleecing victims for their hard-earned money by threatening that something terrible will befall their livelihood if they don’t stump up the cash.

In the modern world, such threats have changed form. While there are most likely still real-world protection rackets that operate like this, many attackers have embraced the digital world to operate a cyber version of this scam; leveraging the importance of a target’s data as a way of bilking money out of them.

This is what is known as a ransomware attack. A classic ransomware attack refers to a type of cyber attack in which attackers break into computer systems and encrypt key files, which the user must then cough up money to regain access to. When the ransom is paid, the attackers send access to a decryption key which restores access to the files. If the money is not forthcoming, the files remain permanently locked and inaccessible. Defending against attacks such as ransomware is a key reason why the use of security measures like risk analytics are so essential for organizations.

 

Evolving forms of ransomware

Traditional ransomware attacks are bad enough. But more recently there has been a new type of attack, referred to as a double jeopardy ransomware attack. In a double jeopardy attack, the overall trajectory of the ransomware attack remains the same: Malware is used to infect a computer system, prior to the encryption taking place, and the extortion notice sent to the victim. The “double jeopardy” part refers to the fact that the ransomware software isn’t simply used to encrypt files, but also to steal that data and send it to off-site servers. Victims do not know where the data has been sent or, in many cases, which data has been stolen from them. However, the threat comes from the fact that it’s not simply about a victim losing access to their personal data, but also the risk that this data could be uploaded to the Dark Web, sent to rival organizations, or otherwise abused in a way designed to cause damage. This adds an extra incentive to targets paying the ransom demanded of them.

Buoyed by this new spin on cyber attacks, overall ransomware attacks have surged. According to recent data, ransomware attacks rose by a massive 288 percent between Q1 and Q2 2021. Many of these attacks involved data theft. The problem of ransomware has become so bad that, in late August, the FBI and Cybersecurity and Infrastructure Security Agency (CISA) issued an official warning about the threat of ransomware and when it is likely to strike. Large numbers of these attacks are timed for points in the year when security may be at its most lax, the same way that burglars may target a house when its occupants are on vacation, at work, or asleep.

For example, a Kaseya supply chain attack targeted at Managed Service Providers (MSPs) took place on the July 4 “Independence Day” weekend in the United States. Meanwhile other recent cyber attacks — such as one on America’s largest meat processor — took place on public holidays like the Memorial Day weekend. In all cases, the goal of attackers is to cause as much chaos as possible at a time when defences may be at their weakest.

 

Protecting against attack

Ransomware attacks are not the only form of cyber attacks that exist, of course — even if they are becoming increasingly commonplace in 2021 due to their potential for monetizing a target’s misery in a way that is tougher to achieve through other forms of cyber attack.

What many contemporary cyber attacks have in common is that they attempt to exfiltrate sensitive data which can then be abused. To safeguard against this, organizations must make sure that they have protective tools in place to protect against data theft. Continuous visibility is essential to paint an accurate picture of who is accessing data at any given moment, as well as what it is that they are doing with it.

As cyber attacks continue to evolve, and there are new requirements from users concerning access to data, organizations must be ready to step up. Data risk analytics can help identify this information by applying advanced big data analytics to activity as a way to spot troubling developing patterns that require investigation. Faster mitigation of risk and incidence response is a “must have” in the modern cyber security landscape.

Thanks to measures such as these, as well as other protective solutions that can help lock down sensitive data and safeguard against attacks, both users and organizations can protect themselves against the worst that cyber attackers have to throw at them. It’s an investment that every organization should take incredibly seriously.

Related Posts:

  • The Liquid C&C Cybersecurity Fusion Centre is set to put Microsoft Data Centre Out of Business.
    The Liquid C&C Cybersecurity Fusion Centre is…
  • router-595x335_0
    US And UK Warn Of Custom Malware Vulnerability On…
  • 3500
    FBI Reports $12.5 Billion American Losses in 2023 To…
  • cyber-security-istock
    African SMEs Face a Host of Cybersecurity Challenges
  • choosing_the_right_dlp_fca4dd5b27
    Why Data Loss Prevention Is necessary
  • 960×0 (1)
    Medusa Ransomware Targets Over 200 Gmail Users
  • Small-Business-Scale-In-Nigeria
    Small Businesses In Nigeria Are Still In Danger,…
  • scam-text
    Common Types Of SMS Scams That Can Put Your…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: cybersecurityransomwaresecurity
Contributor

Contributor

Posts by contributors. You can send in a post to be reviewed and published to info@techbooky.com

BROWSE BY CATEGORIES

Select Category

    Receive top tech news directly in your inbox

    subscription from
    Loading

    Freshly Squeezed

    • AI Helps Google One Reach 150 Million Subscribers May 16, 2025
    • FT Lists Paymenow, TymeBank & Omnisient Among Africa’s Fastest-Growing Firms May 16, 2025
    • MoonPay and Mastercard Partner to Advance Stablecoin Payments May 16, 2025
    • Google Gemini Advanced Users Can Now Link to GitHub May 16, 2025
    • TikTok Accused of Violating EU Internet Content Rules May 15, 2025
    • Activists and Users Criticize NCC & Telcos Over Customer Penalties May 15, 2025

    Browse Archives

    May 2025
    MTWTFSS
     1234
    567891011
    12131415161718
    19202122232425
    262728293031 
    « Apr    

    Quick Links

    • About TechBooky
    • Advertise Here
    • Contact us
    • Submit Article
    • Privacy Policy

    Recent News

    AI Helps Google One Reach 150 Million Subscribers

    AI Helps Google One Reach 150 Million Subscribers

    May 16, 2025
    FT Lists Paymenow, TymeBank & Omnisient Among Africa’s Fastest-Growing Firms

    FT Lists Paymenow, TymeBank & Omnisient Among Africa’s Fastest-Growing Firms

    May 16, 2025
    MoonPay and Mastercard Partner to Advance Stablecoin Payments

    MoonPay and Mastercard Partner to Advance Stablecoin Payments

    May 16, 2025
    Google Gemini Advanced Users Can Now Link to GitHub

    Google Gemini Advanced Users Can Now Link to GitHub

    May 16, 2025
    TikTok Accused of Violating EU Internet Content Rules

    TikTok Accused of Violating EU Internet Content Rules

    May 15, 2025
    Activists and Users Criticize NCC & Telcos Over Customer Penalties

    Activists and Users Criticize NCC & Telcos Over Customer Penalties

    May 15, 2025
    • Login

    © 2021 Design By Tech Booky Elite

    Generic selectors
    Exact matches only
    Search in title
    Search in content
    Post Type Selectors
    • African
    • Artificial Intelligence
    • Gadgets
    • Metaverse
    • Tips
    • About TechBooky
    • Advertise Here
    • Submit Article
    • Contact us

    © 2021 Design By Tech Booky Elite

    Discover more from TechBooky

    Subscribe now to keep reading and get access to the full archive.

    Continue reading

    We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Ok