Ransomware attacks on businesses are spiking, says Kaspersky

Security company says easy-to-use tools make ransomware attacks easier to run

Kaspersky has reported a spike in ransomware attacks targeted at larger businesses.

The increase in such attacks is down to their simplicity and high returns, said Kaspersky senior malware analyst Anton Ivanov.

In particular, attackers can use open source software to make their own encryptors "without making any special effort", he said in a blog post

"A vivid example is the Mamba encryptor based on DiskCryptor, an open source software," he explained. "Some cybercriminal groups do not even take the trouble of involving programmers; instead, they use this legal utility 'out of the box'."

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Ivanov said attackers have a three-step process: find an organisation with an unprotected server with RDP access; guess or buy the password; encrypt a node or server.

"The cost to organise such an attack is minimal, while the profit could reach thousands of dollars," he said.

Of course, not all attacks are so basic, he added, saying "true professionals are also active on the playing field", taking the time to carefully select targets and plan attacks that will last for weeks.

Regardless of the skill of the attackers, companies have to take a few key steps to protect their networks. That includes constantly backing up all servers, audit all nodes and servers to update outdated software, and protect all types of remote access.

The security firm noted the increase as it revealed more organisations have joined its No More Ransom project, designed to offer help to ransomware victims via free unlock tools, so people don't need to pay out to get their data back hopefully discouraging attacks in the future.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/29204/how-can-you-protect-your-business-from-crypto-ransomware
Security

How can you protect your business from crypto-ransomware?

4 Nov 2019
Visit/digital-transformation/31168/four-ways-cios-can-drive-digital-transformation
digital transformation

Four ways CIOs can drive digital transformation

17 Jan 2020
Visit/strategy/28223/cio-job-description-what-does-a-cio-do
Business strategy

CIO job description: What does a CIO do?

7 Jan 2020
Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/microsoft-windows/32066/what-to-do-if-youre-still-running-windows-7
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020
Visit/policy-legislation/general-data-protection-regulation-gdpr/354577/data-protection-fines-hit-ps100m
General Data Protection Regulation (GDPR)

Data protection fines hit £100m during first 18 months of GDPR

20 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020