CryptoWall ransomware raised $325m
The staggering amount was taken from unsuspecting victims and includes ransoms paid to criminals, according to the CTA
The Cyber Threat Alliance has revealed malicious actors managed to raise $325 million (212 million) from the CryptoWall ransomware, including the money paid by victims to get their files unlocked.
Additionally, the report said criminals attempted 406,887 CryptoWall infections and the alliance managed to collect 4,046 malware samples from the attempts.
Cyber criminals using CryptoWall as their tool of choice used 839 command and control URLs for servers to send commands and receive data.
"The explosion of connected devices and our reliance on digital platforms has created an environment that is both empowering and creating new ways for adversaries to penetrate networks," said Derek Manky, global security strategist at Fortinet.
"Managing this risk is a shared responsibility. We need to step forward, and not wait for the adversary to make the move first."
The research was made possible thanks to the collaborative efforts of Fortinet, Symantc, Intel Security and Palo Alto Networks, who together form the CTA.
"This type of collaborative research by security vendors reflects the power of effective threat information sharing and the positive effect it can have on helping maintain trust in our digital world," Vincent Weafer, vice president, McAfee Labs at Intel Security said.
"As a founding CTA member, we are committed to the idea that this new way of working together - of combining intelligence on a common adversary and sharing cyber threat information as a public good - is to the benefit of all organisations in the battle against cyber crime, Weafer continued."
The companies recommended the steps people can use to prevent the attacks happening include keeping their systems and software updated. In addition, they said it's important users better understand the risks posed by phishing attacks, keeping web browsers updated and reviewing access and security policies within corporate networks to ensure only those who need access to systems have it.
B2B under quarantine
Key B2C e-commerce features B2B need to adopt to surviveDownload now
The top three IT pains of the new reality and how to solve them
Driving more resiliency with unified operations and service managementDownload now
The five essentials from your endpoint security partner
Empower your MSP business to operate efficientlyDownload now
How fashion retailers are redesigning their digital future
Fashion retail guideDownload now