By now you have probably heard about ransomware, if not we suggest you read this.
There are different types of ransomware, however, all of them will prevent you from using your PC and/or encrypt your files. To be able to gain access again, you have to pay a ransom amount normally in the form of Bitcoins. Be aware that even after paying the ransom that the chances of getting your file decrypted is not guaranteed and it’s not advisable to pay.
Where does Ransomware come from?
The main gateway for these attacks are user’s workstations. Once they have compromised a single system, hackers use tactics to attack the surrounding infrastructure looking for more data to encrypt. They will gather credentials on the network and attempt to gain additional elevated privileges (e.g. domain administrator).These credentials are then used to map out the organisation’s network allowing them to encrypt more data as the infection spreads.
Some forms of ransomware can self-propagate through local networks in the form of Trojans. While the various types of Ransomware have changed over the years Cryptolocker, TeslaCrypt and Dharma.wallet have been the predominant ones affecting businesses.
Who’s at risk?
Everyone is at risk, from enterprise to home users, Linux, Apple and large Government organisations.
Enterprises however, are the most common victims and are being highly targeted by ransomware due to lucrative industries relying on their core company data.
How to Prevent Ransomware
Once you’ve been hacked, unfortunately, due to the complexity of the encrypted files, it is practically impossible to decrypt the files without the original encryption key. There is however, the possibility that there is no decryption key and the attackers have no intention of giving back your access even after the payment is made.
This is why it is important to ensure all sensitive company data is securely backed up in a remote backup storage facility. Triple4’s backup service offers private offsite backup options which adhere to the highest possible industry security standards, making sure your data is kept as safe as possible. Without these backups the impact of this type of attack on a business could be severe, often proving to have irreversible consequences.