The Different Scenarios How Backups are Vulnerable to Ransomware Attacks



Backups are Vulnerable to Ransomware AttacksOrganizations need to ensure that their data backups aren’t tampered with by attackers, according to security firm Datto. In an article for Channel Futures, Datto explained that backups are an important layer of defense, but they aren’t foolproof. The firm also notes that, while encryption may keep your data private, it won’t prevent a ransomware attacker from simply putting another layer of encryption on top of it and locking you out. Additionally, if an attacker gains access to your internal accounts, they might be able to access the data unencrypted.

Datto says organizations should be on the lookout for the following vulnerabilities associated with backups:

  • “Backup software: Backup software solutions, by nature, require a high level of access. Hackers have been known to steal a backup administrator’s credentials as a backdoor to access systems and data.
  • “Backup files: Backup files can be targets simply because backup file extensions—for example, BAK–are easy to find. Hackers may gain access to the backup software and either turn off or delete the backup files.
  • “Remote access: Since many backup products must connect remotely to servers to back them up or to administer backups, password authentication can open up a path to attack protected systems simply because passwords are easy to steal.
  • “Backup encryption: It isn’t uncommon for backups to be encrypted. However, if attackers gain access to this key, they can read the backup and/or change the key to make the data inaccessible.”

Datto recommends implementing two-factor authentication and isolating backups to prevent attackers from accessing them. Additionally, they suggest using key-based SSH authentication instead of passwords for remote access.

It’s also worth noting that, as organizations have gotten better about backing up their data, ransomware actors have started exfiltrating the data and holding its confidentiality for ransom. As a result, it’s best to prevent the attackers from gaining access in the first place. New-school security awareness training can help your organization avoid falling victim to these attacks by teaching your employees to follow security best practices.

Channel Futures has the story.


RanSim

Free downloadable software tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

RanSim gives you a quick look at the effectiveness of your existing network protection. RanSim will test 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the installer and run it
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransim

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews