Ransomware increases by 172% in H1 2016

Businesses lose $206 million to ransomware, finds Trend Micro

Ransomware is the fastest growing security threat to organisations, according to Trend Micro's 1H Security Roundup Report.

Not only did the occurrence of ransomware families nearly double between the first half of 2015 and first half of 2016, 79 brand new families appeared in the first six months of this year. Many of these new families were specifically developed to attack enterprise-based machines and endpoints, including Crysam, Zcrypt, Crypjoker, Crypradam and Powerware.

These incidents caused huge losses for US businesses - $209 million to be precise - but many of them could have been avoided had the companies taken precautions against them, including educating staff about the risk of ransomware and the damage it can cause, Trend Micro said.

More than half (58 per cent) of the attacks originated from attachments in emails, although Trend Micro explained cybercriminals are becoming more intelligent in their methods use to spread such attacks. For example, Jigsaw threatens to delete a number of files for every hour a ransom isn't paid, while Surprise ransomware increases the ransom amount if the victim does not meet the payment deadline set out by the criminal.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

"Ransomware is capable of crippling organizations who face it, and the cybercriminals spearheading these attacks are creatively evolving on a continuous basis to keep enterprises guessing," said Raimund Genes, chief technology officer for Trend Micro.

"It has dominated the threat landscape so far in 2016, causing immense losses to businesses across multiple industries. Enterprises must adopt multi-layered security solutions to optimally combat these threats that could attempt to penetrate corporate networks at any time."

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

23 Dec 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020