CryptoWall ransomware raised $325m

The staggering amount was taken from unsuspecting victims and includes ransoms paid to criminals, according to the CTA

Ransomware

The Cyber Threat Alliance has revealed malicious actors managed to raise $325 million (212 million) from the CryptoWall ransomware, including the money paid by victims to get their files unlocked.

Additionally, the report said criminals attempted 406,887 CryptoWall infections and the alliance managed to collect 4,046 malware samples from the attempts.

Cyber criminals using CryptoWall as their tool of choice used 839 command and control URLs for servers to send commands and receive data.

"The explosion of connected devices and our reliance on digital platforms has created an environment that is both empowering and creating new ways for adversaries to penetrate networks," said Derek Manky, global security strategist at Fortinet.

"Managing this risk is a shared responsibility. We need to step forward, and not wait for the adversary to make the move first."

The research was made possible thanks to the collaborative efforts of Fortinet, Symantc, Intel Security and Palo Alto Networks, who together form the CTA.

"This type of collaborative research by security vendors reflects the power of effective threat information sharing and the positive effect it can have on helping maintain trust in our digital world," Vincent Weafer, vice president, McAfee Labs at Intel Security said.

"As a founding CTA member, we are committed to the idea that this new way of working together - of combining intelligence on a common adversary and sharing cyber threat information as a public good - is to the benefit of all organisations in the battle against cyber crime, Weafer continued."

The companies recommended the steps people can use to prevent the attacks happening include keeping their systems and software updated. In addition, they said it's important users better understand the risks posed by phishing attacks, keeping web browsers updated and reviewing access and security policies within corporate networks to ensure only those who need access to systems have it.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

Best ransomware removal tools
ransomware

Best ransomware removal tools

9 Apr 2021
1Password targets enterprise customers with Secrets Automation
IT infrastructure

1Password targets enterprise customers with Secrets Automation

14 Apr 2021
PowerShell threats increased over 200% last year
cyber security

PowerShell threats increased over 200% last year

14 Apr 2021
Russia launched over a million cyber attacks in three months
hacking

Russia launched over a million cyber attacks in three months

13 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021