Late in 2019, a new cyber security threat emerged. Criminals used ransomware to attack Allied Universal. In a twist now known as double extortion, the bad actors first extracted sensitive information before encrypting company data. Then they insisted that Allied pay a stiff ransom to avoid seeing sensitive data leaked publicly.
Throughout 2020, other attackers have followed suit. To convince organizations to pay a ransom, criminals threaten to publish or sell the stolen data. To prove their point, they post samples of the data on their websites. Thus, the tactic effectively combines ransomware with data breach. And it places organizations in an extremely difficult position.
To effectively counter the threat of double extortion, organizations must understand the process and the dangers. First, attackers infiltrate and infect the system. Often, they use phishing emails as a vehicle. Additionally, the COVID pandemic opened vulnerabilities as companies rushed to accommodate remote workers, leaving security gaps.
Next, attackers extract a copy of sensitive information for themselves and then execute the ransomware, locking users out of their own data by encrypting it. Most often, all of this occurs before the organization realizes it has an intruder in the system.
Finally, the victim receives notification of the attack, along with a ransom demand. To pressure the victim to pay the ransom, the attacker may publish bits of the stolen data online. As the days pass, the ransom demanded increases. And if the organization still refuses to pay, the attackers publish or auction off all the data.
As a result, the costs mount up quickly. Remediation after an attack can cost more than the ransom itself. And a data breach often means the organization must report to the appropriate data privacy agency, incurring both stiff fines and reputation loss.
While no organization can assume it will remain safe from ransomware, the following practices, when combined, offer essential first steps.
A recent study estimates that cyber criminals attack a business every eleven seconds, using increasingly sophisticated methods. Consequently, organizations need to combine prevention with efforts to limit the damage caused once an attack occurs. The following strategies will help.
As cyber threats continue to evolve, cyber security strategies must evolve at pace. eMazzanti provides the tools and expertise you need to both prevent attacks and minimize the damage when attacks do occur.
For instance, our network services can identify potential threats before they compromise your system. We also offer remote workforce security, email protection, dark web scanning and more. We will customize a security solution geared toward your specific business needs and budget.
Microsoft Exchange provides multiple ways to control email communication in a business. Shared Mailboxes and…
Remote working was once a niche specialty, only used by tech-savvy and freelancers. But in…
While we live in a digital age, print is still a staple for many businesses.…
Increasingly, email communication is playing a pivotal role in business operations, facilitating collaboration, customer engagement,…
As the digital landscape evolves, businesses of all sizes face the challenge of managing complex…
In the evolving landscape of information technology, businesses constantly seek the most efficient and cost-effective…