A list of known ransomware targetsVictims are at risk of repeated cyberattacks, according to a new report released Wednesday by a US cybersecurity firm.
Boston-based Cybereason has previously demanded a stake, according to a commissioned survey of 1,263 cybersecurity experts from various industries in the United States, United Kingdom, Spain, Germany, France and the United Arab Emirates. We confirmed that 80% of the organizations that paid for were exposed to a second attack. Emirates and Singapore.
“If you can hack with Bitcoin and collect anonymous money, combine them. Suddenly you get a very good business model that allows you to quickly collect a lot of money,” Cybereason said. CEO Lio Div told CBS News. ..
This quick transfer has been fully visible in the last few weeks, following a series of high-profile ransom payments.
JBS, the world’s largest meat processing company, last weekAfter being forced to stop slaughter work at 13 meat processing plants.
According to London-based blockchain analytics firm Elliptic, the hacker group behind the Colonial Pipeline attack, DarkSide, received a $ 90 million Bitcoin ransom in eight months.
Last year, ransomware struck Connecticut-based shipping and tech company Pitney Bowes Second time in less than a year. Also, Australian logistics company Toll Group faced a series of ransomware attacks within three months of each other last spring.
“We’ve seen this kind of pattern that turns cybercriminal activity into a business,” said career hacker David “Moose” Wolfpoff, CTO and co-founder of cybersecurity firm Randori. “This is a way for actors to make money, access and achieve their goals.”
Last week, FBI Secretary Christopher A. Wray told lawmakers that cyber threats were “almost exponentially increasing.” The FBI director added that the federal government is currently “investigating 100 different ransomware variants, each of which has dozens, if not hundreds, of casualties.”
According to a new Cybereason report, 66% of victims’ organizations account for a “significant loss of revenue” from ransomware attacks, and 53% report that brands are suffering after a ransomware attack. I am.
A quarter of the companies surveyed eventually closed their organizations, nearly one in three lost top leadership due to dismissal or resignation, and 29% were forced to dismiss.
“The problem people don’t understand is that they don’t switch on when paying the ransom,” Div told CBS News. “Hackers give you the keys to crack your own machine. You have to go one by one to restore them.”
The US funding firm Heritage Company closed at the end of last year after more than 60 years of business following a devastating ransomware attack. The company has given up about 300 employees in an attack that shuts down production servers for an extended period of time.
Colonial Pipeline CEO Joseph Bronde attended a Senate Land Security Commission hearing earlier this month and decrypted the company from a dark side hacker to regain control of the system after paying the ransom. He said the key was “advantageous” but not a complete fix.
Blount said it took a month for the colonial pipeline to bring the financial system back online after paying the ransom to DarkSide, and efforts to restore the company’s operations are still “in progress.”
Ransomware attacks have proven to be expensive for victims, but a new study by cybersecurity firm Cobalt says companies can also be expensive to prevent.
Nearly six in ten cybersecurity professionals in companies with more than 500 employees say that an important precaution, known as penetration testing, is too expensive. Over 40% say they don’t have a penetration testing budget.
According to Cobalt’s Chief Strategy Officer, Caroline Wong, “penetration” or simulated hacking to assess system security has historically been a luxury. “Only the wealthiest, largest and most established companies in the world have access to quality security personnel,” Wong said.
Nearly 90% of Cobalt survey respondents said they had a hard time finding people with the right skills to perform simulated hacking of security systems. Cobalt, which conducts penetration testing for its customers, shared data from more than 1,600 tests conducted on CBS News alone last year.
Data reveals that large companies have been suffering from the same vulnerabilities for the fourth consecutive year. The main problem for enterprises continues to be security server misconfiguration.
“As an industry, cybersecurity experts know how to deal with these issues. We know how to take action to prevent ransomware,” Wong said. She added that time and money are hampering the protection of a company’s assets.
Wong said one of the reasons companies face unsafe configurations is that they don’t have a complete list of all their assets. As a result, the security system is not properly configured and some companies are failing to change the default settings.
On average, respondents to the Cobalt survey say they are penetrating over 60% of their application portfolio. This means that potential security gaps are routinely overlooked.
“We need to know our assets, fix vulnerabilities, and make backups,” Wong said. “If you’re proactively testing, you don’t have to respond after an incident,” she added.
As the number of cases increases, US lawmakers and world leaders are gaining attention. The White House has publicly stated that the Kremlin is playing a role in preventing ransomware attacks.
Earlier this month, White House spokesman Jen Psaki told reporters, “It is unacceptable to contain criminal gangs that are intended to harm critical US infrastructure. We are not going to support it. ”
Since last week, Seven countries “stop volatile behavior and malicious activity” against Russia, “ransomware attacks, ransom abuse to clean ransom, and other cybercrime” I issued a statement calling for “explaining the people in the border who go and go.”
President Biden will meet with Russian President Vladimir Putin on Wednesday, and it is unclear exactly what they will discuss,There are several areas where two leaders are expected to work together.
“And if he chooses not to cooperate and acts as in the past with respect to cybersecurity and other activities, we will respond. We will respond kindly,” Biden said.
According to a new report, 80% of ransomware victims are repeatedly attacked
Source link According to a new report, 80% of ransomware victims are repeatedly attacked