Just in Time for Halloween: A Ransomware Horror Story and How You Can Get the Best Ransomware Protection Software
Ransomware has made a few major appearances in the global media this year. You may remember the WannaCry virus, which not only targeted large corporations, but temporarily locked the network of the United Kingdom’s National Health Service hospitals. Reports of medical chaos, including crippled emergency rooms and delayed medical procedures, sent a shiver down the spine of every IT manager who saw them.
Or, you may remember that a month after WannaCry, a ransomware called Petya infected the networks of multiple companies around the globe. The pharmaceutical company Merck, Danish shipping company Maersk, and Russian oil giant Rosnoft were all infected. Petya hit Ukraine the hardest, disrupting power companies, airports, public transit, and the central bank. Governments around the world watched with sweaty palms.
What is Ransomware?
Ransomware is malicious software, or malware, that infiltrates a victim’s computer or device and encrypts all the files on the device that it can access. Until the ransom is paid the files are inaccessible. Sometimes, hackers will add an additional blackmail threat of publicly releasing sensitive data. The vector for ransomware is overwhelmingly an email that convinces users to click on a malicious link or a malicious attachment.
WannaCry and Petya are just some of the most newsworthy examples of ransomware. But the malware affects companies of all sizes, most of which you’ve never heard of.
Just last year, ransomware cost businesses $1 billion. And it’s more than just ransom payments — organizations lose significant operational time and take a negative hit on their reputation with every breach.
Less than half of all organizations who are ransomware victims ever fully recover their data, whether they pay up or try to restore from a backup.
Looking back at ransomware statistics from 2016, it’s clear that the ransomware monster is mutating and growing stronger:
- In 2016, ransomware became the most popular form of malware in the US
- 97% of all phishing emails with malware payloads contained ransomware versus other types of malware
- There has been 600% growth in new ransomware families since December 2015
- There were more than 4,000 ransomware attacks each day in 2016
- At the beginning of 2016, businesses were hit with a ransomware attack every two minutes, but by the end of 2016 that increased to a new attack every 40 seconds
Vade Secure has the Best Ransomware Protection Software
We know that’s a lot of terrifying info. We won’t lie, the truth is we want you to be afraid.
But like an anti-drunk driving PSA, we’re only scaring you because we care about you and want you to avoid disaster. We know firsthand the havoc and financial damage wrought by ransomware. We know the number #1 reason companies get infected is because they assumed they weren’t at risk and didn’t have adequate protection.
Effective ransomware protection, especially in the form of email security, is necessary for defending your organization when ransomware strikes. Vade Secure offers the best ransomware protection software.
Vade Secure’s advanced email protection solution uses artificial intelligence to defend against ransomware, spear phishing, and zero-day attacks. Our multi-layered approach ensures protection by keeping dangerous emails away from employee inboxes.
Our solution uses:
- Technical analysis
- Fingerprint analysis
- Behavioral analysis
- Comprehensive file analysis
These processes work in conjunction to ensure that emails are legitimate. We make sure that emails are really coming from who they say they are, have legitimate attachments, and that URLs don’t lead to counterfeit phishing webpages.
Our solution has successfully detected every variant of Locky and CryptoLocker over the past several years with 100% accuracy.
Locky: A crypto ransomware that often gets delivered through legitimate-looking .doc files. These .doc files contain macros, which is a single coding instruction that automatically expands to perform a specific task. Victims initially receive some type of scrambled invoice document and are instructed to enable macros – allowing the software to infiltrate their device instantly.
CryptoLocker: Targets Windows computers and is generally delivered by email as a ZIP file which contains an executable file with the filename and the icon disguised as a PDF file. When first run, the payload installs itself in the user profile folder, and adds a key to the registry that causes it to run on startup. It then attempts to contact command and control servers which generate a 2048-bit RSA key pair, and sends the public key back to the infected computer. Local and accessible network files with certain key extension like office documents, CAD files, etc are then encrypted.
Want to learn about how are AI-backed software can protect your organization from all types of cyber threats? Contact us today.