Question

what are the trends in ransomware ?, how it is deployed, who gets attacked, and whether...

what are the trends in ransomware ?, how it is deployed, who gets attacked, and whether victims get access to their (decrypted) data. Provide a short list of recommendations for small businesses to prevent or deal with ransomware.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

A. What are the trends in ransomware?

Following are few ransomware trends:

  • Publication of victim files— This has already happened that cybercriminals have threatened victims to publish thieir files if ransom is not paid. This can extend and attackers can extort thier victim in fifferent ways.
  • The “ransomware as a service”(RaaS) market can flourish — Many underexperiences attackers and cybercriminals are offering RaaS. Underground forums are filled with ransomware ads.
  • Role of courts in driving behaviour of criminals and victims — As ransom amount keeps increasing, Victims will be provided more incentive for reachinf out to the courts inorder to recover thier funds and stop ransomware attackers from publishing victims personal information.
  • Advanced Persistent Threat (APT): These are specially designed personalized attacks in order to bypass or break down the current safeguards. Cybercriminals will invest in such approachs and use them to destroy the safeguards like backing up of data to the cloud.

B. How it is deployed?

First phase of a ransomware attack is the installing components that can be used to infect victim’s system. Following are some ways through which the files used as part of the attack are downloaded on the victim’s system:

1. Drive-by download: automatically download malware or spyware without the user’s knowledge.

2. Strategic web compromise or watering-hole attack: Here the attackers collects strategic information which is used to enter victims’ organization. The information gathered can be in the form of trusted websites usually visited by their target. Then Attackers insert a malware into such sites and when target visits the site, the malware make use of any vulnerabilities in the system to gain control and access.

3. Phishing emails: Spam emails are sent in this attack. These emails might contain links or attachments to malicious websites.

4. Exploiting vulnerabilities in Internet-accessible systems: Makes use of methods like Network scanning for finding vulnerabilities.

C. Who gets attacked, and whether victims get access to their (decrypted) data.

Following are four target groups of ransomwares:

  • Universities: This is a potential target because they have a lot of file sharing and less security. They are perceived to have a smaller security team.
  • Banks, government agencies, medical facilities etc.: They fall under the target category which can pay quickly. This is because they require immediate access to their files.
  • Law firms: because these hold sensitive and critical data.
  • Businesses in the Western markets: targeting these types of corporates can lead to bigger ransom. Western markets have greater wealth, and many uses personal computers.

Ransomware encrypts files present on victim's system. In order gain access or decrypt the data, the attacker demands a ransom from the victim. Victim is instructed on how to pay the ransom to get the decryption key.

D. Provide a short list of recommendations for small businesses to prevent or deal with ransomware.

Following are some recommendations for small businesses to prevent ransomware:

  1. Avoid providing personal information in emails, over phone calls or messages. This is because attackers try to trick employees into installing malware on their machines or gain information. Inform IT department of your organization in case you get such suspicious calls. Attackers gather information through social media too. Organization should have a strict social media policy to limit work-related information from being uploaded on social media.
  2. Don’t pay the ransom because if you pay the ransom, it’s not guaranteed that you will regain access to your data. And only thing it will do is encourage and fund the attackers.
  3. Invest in a good antivirus and firewall and keep your security software up to date with relevant patches. This will protect you from some ransomware attacks which use old versions software’s.
  4. Backup your data every day. Impacted files can be recovered from backup copy.
  5. Scanning and filtering of inbound e-mails should be done and block attachments that appear to be threat.
Add a comment
Know the answer?
Add Answer to:
what are the trends in ransomware ?, how it is deployed, who gets attacked, and whether...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1-how litterally you get the bible? 2- who get to define what science is ou isn't? 3- who gets to control what is taugh...

    1-how litterally you get the bible? 2- who get to define what science is ou isn't? 3- who gets to control what is taught in school? 4- what do you think are the most important things we can learn from the scopes controversy? please help me with these questions.

  • Discuss the effects of prostate cancer and testicular cancer. Who is at risk and how can it be prevented? Do you think...

    Discuss the effects of prostate cancer and testicular cancer. Who is at risk and how can it be prevented? Do you think public awareness and early diagnosis of male cancers has changed in recent years, why/why not? Identify two sexually transmitted diseases and discuss their causes, transmission, side effects, and treatment. What does the data show about recent trends in the occurrence/incidence rate of the two sexually transmitted diseases you identified? Discuss strategies to prevent sexually transmitted diseases. Please type...

  • Identify who can bring a lawsuit and against what defendants and based on what law and...

    Identify who can bring a lawsuit and against what defendants and based on what law and applied facts. Briefly explain whether the case is strong or weak. When finding ‘torts’ (chapter 6) be sure to name the tort, provide a brief definition, and apply to the relevant facts indicating again, the identity of the defendant. You may make a list of the lawsuits (number them if you want to do so), setting out the identity of the plaintiff, the law...

  • Many grocery store chains ofer customers a card they can scan when they check out and...

    Many grocery store chains ofer customers a card they can scan when they check out and offer discounts to people whoo so. To get the card, customers must give information, including a mailing address and e-mail address. The actual purpose is not to reward loyal customers but to gather data. What data do these cards allow stores to gather, and why would they want that data? What data do these cards allow stores to gather? Select all that apply A....

  • Describe how the officers' behaviors might be improved by using the basic principles of police organization...

    Describe how the officers' behaviors might be improved by using the basic principles of police organization as well as policies, procedures, rules, regulations, and discipline. bodily from the station by the patrol officer, who pushed him down a flight of steps to the sidewalk. The man regained his equilibrium and quietly walked off into the night, beaten by the system. He returned later, paid the fee, and reclaimed his car. DISCUSSION QUESTIONS 1. If you were the sergeant in this...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • please answer this after reading the article What is the actual problem? What are the known...

    please answer this after reading the article What is the actual problem? What are the known facts? What decision is to be made? How the problem ought to be solved? What are the alternatives? What are your recommendations? New AI tools make BI smarter — and more useful Data science democratized: What used to take data scientists months to prepare may soon be put together in a few days by data-astute business users. By Maria Korolov, Contributing Writer, CIO |...

  • QUESTION 1 Takyiwaa, Salamatu and Adade are Undergraduate Students from the University of Professional Studies who...

    QUESTION 1 Takyiwaa, Salamatu and Adade are Undergraduate Students from the University of Professional Studies who studied Management of Small and Medium Enterprise. After their National Service they decided to start a Restaurant Business. The overarching purpose for opening a Restaurant, was to be the second to none producers of Quality service in the Restaurant Business in Accra and respect for the customer. Starting a business of like nature is time consuming and full of uncertainty in view of the...

  • I need a summary and your thought about this article. How to Safeguard Trust in the...

    I need a summary and your thought about this article. How to Safeguard Trust in the Digital Age? Data analytics, AI, and other tools of the digital age can help marketers improve CX, but they also may raise concerns about data usage and privacy. Brands have an opportunity to build trust by showing they use these technologies wisely—and always in service to the customer. Advanced technologies that gather and apply customer data can be significant differentiators for a brand—and their...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT