Ryuk

FortiGuard Labs Reports Tenfold Increase in Ransomware

Retrieved on: 
Monday, August 23, 2021

Fortinet (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, today announced the latest semiannual FortiGuard Labs Global Threat Landscape Report .

Key Points: 
  • Fortinet (NASDAQ: FTNT), a global leader in broad, integrated, and automated cybersecurity solutions, today announced the latest semiannual FortiGuard Labs Global Threat Landscape Report .
  • Highlights of the 1H 2021 report follow:
    1) Ransomware Is About Much More Than Just Money: FortiGuard Labs data shows average weekly ransomware activity in June 2021 was more than tenfold higher than levels from one year ago.
  • A key takeaway is that ransomware remains a clear and present danger for all organizations regardless of industry or size.
  • Learn more about FortiGuard Labs threat intelligence and research or Outbreak Alerts , which provide timely steps to mitigate breaking cybersecurity attacks.

Cloudian Ransomware Survey Finds 65% of Victims Penetrated by Phishing Had Conducted Anti-Phishing Training

Retrieved on: 
Thursday, July 15, 2021

The survey found that traditional ransomware defenses are failing, with 54% of all victims having anti-phishing training and 49% having perimeter defenses in place at the time of attack.

Key Points: 
  • The survey found that traditional ransomware defenses are failing, with 54% of all victims having anti-phishing training and 49% having perimeter defenses in place at the time of attack.
  • The survey found that:
    Phishing continues to be one of the easiest paths for ransomware, with 24% of ransomware attacks starting this way.
  • Phishing succeeded despite the fact that 54% of all respondents and 65% of those that reported it as the entry point had conducted anti-phishing training for employees.
  • The survey was conducted among 200 IT decision makers in the US whose organization had experienced a ransomware attack in the last two years.

Trend Micro Warns of Ransomware Targeting Industrial Control Systems

Retrieved on: 
Wednesday, June 30, 2021

"Industrial Control Systems are incredibly challenging to secure, leaving plenty of gaps in protection that threat actors are clearly exploiting with growing determination," said Ryan Flores, senior manager of forward-looking threat research for Trend Micro.

Key Points: 
  • "Industrial Control Systems are incredibly challenging to secure, leaving plenty of gaps in protection that threat actors are clearly exploiting with growing determination," said Ryan Flores, senior manager of forward-looking threat research for Trend Micro.
  • Industrial Control Systems (ICS) are a crucial element of utility plants, factories and other facilitieswhere they're used to monitor and control industrial processes across IT-OT networks.
  • Trend Micro's report found that Ryuk (20%), Nefilim (14.6%), Sodinokibi (13.5%) and LockBit (10.4%) variants accounted for more than half of ICS ransomware infections in 2020.
  • With 7,000 employees across 65 countries, Trend Micro enables organizations to simplify and secure their connected world.

Cybersecurity Pioneer Cyemptive Technologies Says Colonial Pipeline and JBS meat processing Ransomware Attacks Could Have Been Prevented; Warns that Organizations Need to Change Their Cybersecurity Models to Avoid Future Attacks

Retrieved on: 
Wednesday, June 23, 2021

According to industry research, even prior to the COVID pandemic, ransomware attacks have been on the rise, growing by more than 20% from last year.

Key Points: 
  • According to industry research, even prior to the COVID pandemic, ransomware attacks have been on the rise, growing by more than 20% from last year.
  • The pace has increased over the ensuing months as hackers have taken advantage of the pandemic with more and more people working from home.
  • Request that your ransomware protection provider check the USB drive or the email attachments, or run your ransomware protection software.
  • Hackers clearly have the advantage against todays technologies, said Bryan Seely, Cyemptives Senior Security Architect and well-known cybersecurity author and expert.

Survey: 60% of Educational Organizations Hit by Phishing Attacks Targeting Cloud Data, the Highest Result of All Verticals Analyzed

Retrieved on: 
Tuesday, April 13, 2021

b'The majority of educational organizations experienced phishing attacks (60%) and account compromise (33%) in 2020.

Key Points: 
  • b'The majority of educational organizations experienced phishing attacks (60%) and account compromise (33%) in 2020.
  • Phishing was the most common incident suffered by all verticals analyzed in the report, but the frequency of this type of attack in the educational sector was much higher than the average of 40%.
  • Also, 27% of educational organizations experienced ransomware and 49% were unaware of the infection for days.
  • With IT teams forced to be reactive instead of proactive towards security, the current wave of PYSA ransomware attacks can easily lead to breaches.

Promero offers free Security Service Assessment and Email Exposure Report to help business protect against Cyber Attacks and Ransomware

Retrieved on: 
Friday, April 9, 2021

Ransomware attacks are where criminals encrypt all of the data on the network and demand payment in exchange for the decryption key.

Key Points: 
  • Ransomware attacks are where criminals encrypt all of the data on the network and demand payment in exchange for the decryption key.
  • It is now fairly obvious that becoming a ransomware target is no longer an 'if', but rather a 'when' presumption.
  • In 2020, Ransomware costs are approached $20 billion in all businesses with the average ransomware payment demand was $233,817 per attack.
  • PromeroMDR provides -- absolutely at no charge or obligation for any business -- a free network security assessment and an email exposure report.

Cynet Reviews the Top 6 Most Notable Cyber Attacks of 2020

Retrieved on: 
Tuesday, February 23, 2021

These cyber events were part of an ongoing series of attacks, keeping IT security professionals on high alert.

Key Points: 
  • These cyber events were part of an ongoing series of attacks, keeping IT security professionals on high alert.
  • Many of these never made the headlines, but six major attacks did ranked below by their overall impact.
  • Software AG: Clop Ransomware Attack - The second-largest software vendor in Germany was reportedly hit by a ransomware attack in October 2020.
  • Sopra Steria: Ryuk Ransomware Attack The 46,000 employee European information technology firm announced on October 21, 2020 that it had detected a cyber attack the previous evening.

Sophos Reports On How SystemBC Has Developed Into An Off-The-Shelf Tor Backdoor Used By Ransomware Operators

Retrieved on: 
Wednesday, December 16, 2020

OXFORD, United Kingdom, Dec. 16, 2020 (GLOBE NEWSWIRE) -- Sophos , a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor .

Key Points: 
  • OXFORD, United Kingdom, Dec. 16, 2020 (GLOBE NEWSWIRE) -- Sophos , a global leader in next-generation cybersecurity, today published new research into the SystemBC malware, Ransomware operators use SystemBC RAT as off-the-shelf Tor backdoor .
  • Sophos research is based on investigations into recent ransomware-as-a-service attacks involving Ryuk and Egregor, which all deployed SystemBC.
  • We are increasingly seeing ransomware operators outsource the deployment of ransomware to affiliates using commodity malware and attack tools, said Sean Gallagher, senior security researchers, Sophos.
  • SystemBC is a regular part of recent ransomware attackers toolkits Sophos has detected hundreds of attempted SystemBC deployments worldwide over the last few months.

Puma Biotechnology Reports Inducement Awards Under Nasdaq Listing Rule 5635(c)(4)

Retrieved on: 
Friday, December 11, 2020

The award was granted under Pumas 2017 Employment Inducement Incentive Award Plan, which was adopted on April 27, 2017 and provides for the granting of equity awards to new employees of Puma.

Key Points: 
  • The award was granted under Pumas 2017 Employment Inducement Incentive Award Plan, which was adopted on April 27, 2017 and provides for the granting of equity awards to new employees of Puma.
  • The award was granted as an inducement material to the new employee entering into employment with Puma, in accordance with Nasdaq Listing Rule 5635(c)(4).
  • Puma Biotechnology, Inc. is a biopharmaceutical company with a focus on the development and commercialization of innovative products to enhance cancer care.
  • NERLYNX is a registered trademark of Puma Biotechnology, Inc.
    View source version on businesswire.com: https://www.businesswire.com/news/home/20201211005127/en/

Ransomware prevention: An update for businesses

Retrieved on: 
Friday, December 11, 2020

A threatening message appears on the screen demanding a ransom if you ever want to see your data again.

Key Points: 
  • A threatening message appears on the screen demanding a ransom if you ever want to see your data again.
  • It may sound like a nightmare, but for many companies, a ransomware attack is all too real.
  • And even more disturbing is that reported ransomware attacks have increased dramatically since the beginning of the COVID-19 pandemic.

Ransomware: The basics

    • Its a form of malware that can lock up networks and deny access to business-critical data unless the victim pays a ransom often in bitcoin to the attackers.
    • What is different is that industry sources report a major surge in the number of ransomware attacks in 2020.
    • Because cyber attackers are looking to prey on the rapid transition to remote work and the uncertainty companies have experienced in the tumultuous recent months.
    • As ransomware has grown into a serious business, attackers have become increasingly sophisticated.
    • Indeed, recent attacks have targeted manufacturers with no consumer-facing presence and some entities in the nonprofit sector school systems, state and local governments, universities, healthcare centers, etc.

How attackers are exploiting the pandemic

    • Phishing and other forms of social engineering remain the most common way that attackers infect networks with ransomware.
    • Phishing emails may ask recipients to click on a malicious link, open an attachment containing malware, or confirm system credentials.
    • The COVID-19 pandemic has proven to be an especially useful hook for ransomware attackers.

How you can help protect your business

  • Prevention remains the defense against ransomware, and the pandemic has made it more important than ever for companies to guard against this threat. Experts suggest some commonsense steps to reduce the risk that your business could become the next victim of a ransomware attack:
    • Keep your network patched and make sure all your software is up to date.
    • Back up your systems regularly and keep those backups separate from your network. Use separate credentials for your backups so that even if your network is compromised, your storage remains secure.
    • Practice good cyber hygiene. For instance, know what devices are attached to your network so you can identify your exposure to malware. Implement technical measures that can mitigate risk, like endpoint security, email authentication, and intrusion prevention software.
    • Be prepared. Make sure you have an incident response and business continuity plan. Test it in advance so you’re ready if an attack occurs.
    • Train your employees on how to recognize phishing attacks and other forms of social engineering.

Should a company pay a ransom?

    • But what if a company doesnt have reliable backups?
    • If youve been the victim of a ransomware attack, Step #1 should always be to contact law enforcement for example, your local FBI field office.
    • The next question companies ask is if they should pay the ransom.
    • On top of that, ransoms reward attackers and may further fund criminal enterprises in violation of the law.
    • The best defense against ransomware is an alert staff trained to spot the preliminary signs of a ransomware attack.
    • Require periodic refreshers for experienced staff, reinforcing the basics and educating them about new tricks and schemes used by cyber attackers.