Three More Ransomware Families Join the Extortion Game



ransomwareAs ransomware creators look for ways to ensure they get paid for their malicious efforts, many are taking a page from the Maze ransomware manual and are posting stolen data if not paid.

Ransomware has evolved from a nuisance, to a productivity killer, to a material business disruption, and now to a full-fledged data breach attack. Back in December of last year, the Maze family of ransomware adopted a new attack angle – threatening to post a set of stolen data to a specific website if the ransom wasn’t paid. With the threat being massive operational disruption and a data breach to contend with, organizations would seem sufficiently motivated to simply pay up.

Fast-forward to today, and three additional families have adopted the same technique. According to BleepingComputer, Sodinokibi/REvil, Nemty, and DoppelPaymer now all include the same style of “pay or we publish” tactic embedded as part of their attack.

There are two big concerns here. The first is that organizations need to recognize that this will grow as a trend and, should they be attacked with ransomware, there are very few outs here. Second, ransomware as an attack now must be considered a data breach; some subset of the organization’s data is stolen as part of the attack in order to both prove to the organization they have it, and to post should the ransom not be paid.

Organizations need to take a proactive stance against these kinds of attacks by addressing their two most common attack vectors – RDP access and phishing attack. RDP is easy – stop opening up remote access to the Internet (See? Easy.) Phishing attacks require both a layered set of security solutions designed to detect and stop malicious content, and Security Awareness Training to educate the user on how to quickly spot both suspicious and obviously malicious email content before clicking on attachments and links, and launching what can be a ransomware-turned-data-breach attack.




Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews