Half of All Organizations Have Had Employees Approached to Aid in Ransomware Attacks



Employees Approached to Aid Ransomware AttacksPartially due to the shift to working remotely, cybercriminals are finding some resemblance of success in getting internal assistance, begging the question of what to do about it.

In order for a ransomware attack to be successful, threat actors need plenty of access throughout a victim organization. Most often, we’re seeing this accomplished via honed hacking techniques. But once in a while, we see cybercriminals going the manual route. Back in August, we saw Nigerian threat actors solicit victim organization employees to deploy demon ransomware, offering nearly half the ransom yet-to-be collected.

New data in an infographic from Hatachi ID shows that an average of 48% of organizations have been approached to assist in helping to plan a ransomware attack. Director-level employees seem to be a more interesting target, with 55% of them being approached.

One of the reasons for this occurring may be found in the Hitachi ID data; the majority of organizations (83%) believe this solicitation has become more prominent since employees began working remotely.

The good news is an average of 90% of organizations are providing some form of Security Awareness Training to educate users on how to prevent phishing attacks, create secure passwords, and keep those passwords safe.

In order to ensure employees do not become the next accomplice, it’s imperative to have proper security solutions in place, as well as to make certain that your awareness training is continual in nature and occurs online, rather than the typical infrequent break room trainings.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews