From small and midsize businesses (SMBs) to large enterprises, data is at the heart of most organizations today. While 90% of the world’s data was created in the last two years, in that same time span, data breaches were up 54%. Recognizing the value of data, cyber criminals are increasingly turning to ransomware as a means of monetization. They infiltrate IT systems and access data through various hacks, encrypting, locking, and exfiltrating files. Unable to access information that is critical to their businesses, hacked organizations are forced to pay for the information to be released by the cyber criminals.
Ransomware Attacks Skyrocket
Ransomware attacks more than doubled last year, with hackers modifying attack methods for more lucrative payouts. Yet at the same time, only one in three organizations say they are confident they can track and remediate attacks.
The financial repercussions of ransomware skyrocketed as well. Ransomware is expected to have a global impact of $20 billion by 2021. Ransomware demands commonly reach six-figure sums, and because the transfer is often made by bitcoin, it is relatively simple for cyber criminals to launder it without it being traced.
The indirect costs are those of business interruption that are associated with a ransomware attack. In the public sector, 42% of organizations have suffered a ransomware incident in the last 12 months, with 73% of those experiencing two or more days of downtime as a result.
Business Impact of Ransomware
The cost in system downtime and the inability to access information due to ransomware attacks equates to billions of dollars today, a number that could rise into the tens of billions as ransomware hacktivists go after Internet-of-Things (IoT) devices.
With doxxing, whereby cyber criminals threaten to release rather than delete private information, becoming a tactic that ransomware cyber criminals employ, the repercussions are even more serious. Add ransomware attacks on IoT devices used to deliver patient care, and the implications become life-threatening.
Ransomware attacks dominated healthcare headlines during the latter part of 2019, increasing by 350% in Q4, with attacks on IT vendors disrupting services on hundreds of dental and nursing facilities, while many hospitals, health systems, and other covered entities reported business disruptions from these targeted attacks.
There are many examples from recent years, including how hacktivists gained access to a MongoDB database containing protected health information for 200,000 patients of a major health center. The database was wiped clean and replaced with a ransom demand for $180,000 in bitcoin for its safe return.
Another major medical center in Hollywood, California, declared a state of internal emergency after its systems were infected with Locky ransomware. Physicians and other caregivers were locked out of electronic health records, forcing staff to use pen and paper for logging patient data, and fax—instead of email—for communicating with each other. The hacktivist demanded 40 bitcoin (or about $17,000) in exchange for a key to decrypt the locked files, which the hospital paid. But cyber criminals do not always grant victims access to their information. In the case of a hospital system in Kansas, the hospital paid the initial ransom, but the hacktivists did not fully unlock the files and demanded more money to do so. It was at that juncture that the hospital elected to decline the additional ransom.
How Ransomware Happens
So, how does ransomware happen? Let’s begin by addressing how it is distributed. Any digital means can be used: email, website attachments, business applications, social media, and USB drivers, among other digital delivery mechanisms. Emails remain the number one delivery vector, with cyber criminals preferring to use links first and attachments second.
In the case of email, phishing emails are sent as delivery notifications or fake requests for software updates. Once a user clicks on the link or the attachment, there is often (but less so recently) a transparent download of additional malicious components that then encrypt files with RSA 2048-bit private-key encryption, leaving it nearly impossible for the user to decrypt the files. In other instances, ransomware is embedded as a file on a website, which when downloaded and installed, activates the attack.
Different Types of Ransomware
Ransomware attacks come in different forms. This past year has seen a substantial evolution in ransomware attacks. Traditional ransomware goes after your data, locking files until the ransom is paid. But with the rapid growth in IoT devices, a new strain of ransomware emerged. It doesn’t go after an organization’s data, but rather it targets control systems (e.g., vehicles, manufacturing assembly lines, power systems) and shuts
them down until the ransom is paid.
Let’s take a quick look at some of the most prevalent types of ransomware that exist today:
Ransomware families and variants exploded in 2016, growing tenfold. FortiGuard Labs saw multiple new variants every day throughout 2016. This rapid growth and constant evolution makes it even more difficult for organizations that rely on traditional signature-based antivirus solutions to keep pace. By the time one strain has been identified and blacklisted, cyber criminals have already moved to a new variation. The Ryuk and Sodinokibi ransomware families, for example, both contributed to an increase in the ransom amounts demanded by attackers in Q1 of 2020.
End-to-End Protection From Fortinet
Takeaways:
Chanvith Iddhivadhana, Fortinet’s Thailand Country Manager advises that, “Organizations will do well to heed the following takeaways as ransomware evolves and mutates into an ever-increasing threat to organizations of virtually every shape and size:
In an era where Artificial Intelligence (AI) plays a crucial role in driving all sectors of the digital economy finance, healthcare, transportation, and manufacturing, AI's capability to enhance operational efficiency and foster innovation has become a key factor in a country's competitiveness. However, alongside these benefits, cyber threats associated with AI are rapidly increasing. Cybercriminals now leverage Generative AI (GenAI) to develop sophisticated Phishing Campaigns, Deepfake content,
ไซเบอร์จีนิคส์ ชี้ AI Security และ Risk Management เสาหลักสำคัญ สู่ความยั่งยืนแห่งอนาคตของเศรษฐกิจดิจิทัลไทย
—
ในยุคที่ ปัญญาประดิษฐ์ (AI) ได้เข้ามามีบทบา...
Trademan โปรแกรมวิเคราะห์และซื้อขายหุ้นสำเร็จรูป ได้รับความสนใจจากผู้ใช้งานอย่างล้นหลาม เดินหน้าพัฒนาฟีเจอร์อย่างต่อเนื่อง หวังยกระดับตลาดทุนไทย
—
หลังจากการเ...
OPPO Pad SE วางจำหน่ายแล้ววันนี้! สัมผัสประสบการณ์ความบันเทิงเต็มรูปแบบพร้อมการใช้งานสุดสมาร์ท ในราคาเริ่มต้นเพียง 5,999 บาท!
—
OPPO ประกาศวางจำหน่าย "OPP...
Taobao เปิดตัวเวอร์ชันภาษาไทย มุ่งสร้างประสบการณ์การช้อปปิ้งที่เหนือกว่าสำหรับชาวไทย
—
แอปพลิเคชันเดียวครบทุกความต้องการ ช้อปสะดวก จบในแอปเดียว กับบริการจ...
READY โชว์วิสัยทัศน์ พร้อมตอกย้ำการเป็นผู้นำด้านแพลตฟอร์มการขาย และการตลาดดิจิทัลแบบรวมเป็นหนึ่งเดียว ในงาน Thailand Earnings Call Q1/2025
—
นายทรงยศ คันธ...
Nutanix เปิดตัว Cloud Native AOS ขยายการใช้งาน Data Platform ขององค์กรไปยัง Kubernetes ใดก็ได้
—
โซลูชันใหม่นี้ช่วยให้นักพัฒนาซอฟต์แวร์สร้าง cloud-native ...
Nutanix Announces Cloud Native AOS to Extend the Enterprise Value of its Data Platform to Kubernetes Anywhere
—
New solution enables developers to simply ...
รายงาน Whitepaper ฉบับใหม่เผยศักยภาพ AI ในการพลิกโฉมอุตสาหกรรมการผลิต หนุนไทยก้าวสู่ยุทธศาสตร์ประเทศไทย 4.0
—
รายงาน whitepaper ฉบับใหม่ที่เผยแพร่ในวันนี้...