Ransomware in a Pandemic: A Perfect Storm
COVID-19 has provided cybercriminals with a unique opportunity to take advantage of remote workers lack of preparedness and lack of security to make a lot of money.
The way we work forever changed with the onset of Coronavirus. As companies everywhere closed their doors and pivoted to a remote model with little time to prepare, the disruption of the newly dispersed workforce was creating the perfect storm for cybercriminals. Evident by the barrage of ransomware attacks thus far in 2020, and the vast number of malicious campaigns exploiting Covid-19.
Over the past several months cybercriminal rings have found success with Covid-19 themed attacks. Victims have been lured with everything from phishing emails containing Fake News around vaccines, malware hidden in free downloads for video conferencing software and malicious advertisements for commodities in short supply such as hand sanitizer. All inevitably designed to infect an organization with ransomware.
Reputation is Everything
Ransomware attacks have significantly more consequences than the cost of remediation, assessment and regulatory reporting.
Information technologies services giant Cognizant provides a sobering example of what can happen. The company who is one of the largest IT Managed Service Providers in the world, saw their revenues decline from $509 million to $360 million in less than one quarter after the attack, even while industry revenues were still soaring.
It certainly doesn’t help that this company was in the industry of advising other companies about how to protect themselves. More recently, a subsidiary of DXC Technology, a large global MSP provider, announced that they also suffered a ransomware attack that took services offline for several hours.
How BlackFog can Help?
Intrusion detection systems such as Firewalls and Anti-Virus solutions that remove known infections are not enough to prevent attackers from infiltrating the network.
The inherent mobility of today’s workforce and the number of new remote workers emerging in the wake of Coronavirus is making it increasingly difficult for companies to keep track of what’s happening on every device in the network. With a significant proportion of network transactions taking place in the background without consent, it is important that organizations are closely monitoring this activity. Preventing the transmission of sensitive data to unidentified servers in regions where high levels of cyberattacks originate is paramount to protecting all network infrastructure.
Related Posts
Ransomware Containment: Effective Strategies to Protect Your Business
Discover effective ransomware containment strategies for your business. This guide discusses network segmentation, zero trust, and practical best practices for IT managers and cybersecurity professionals to reduce ransomware damage.
Ransomware Meets Retail: Sainsbury’s, Starbucks and Morrisons Feel the Heat from Blue Yonder Attack
The Blue Yonder ransomware attack disrupted major retailers like Sainsbury’s, Starbucks, and Morrisons, highlighting the vulnerabilities of global supply chains and the urgent need for stronger cybersecurity defenses.
Top 5 Cyberattacks During Black Friday and Thanksgiving
Find out about the top five biggest cyberattacks for Black Friday and Thanksgiving, from data breaches and ransomware, to see the risks businesses experience during the holidays.
Healthcare Ransomware Attacks: How to Prevent and Respond Effectively
Learn how to protect yourself from healthcare ransomware attacks. We discuss the main security weaknesses, suggest security steps, and offer possible means of protecting patient information.
Everything That You Need to Know About the Dark Web and Cybercrime
Learn about the dark web, including who uses it, how it operates, and what tools cybercriminals obtain on it. Find out how BlackFog monitors networks, forums, and ransomware leak sites in order to stay ahead of new threats.
Ongoing: New Ransomware Gangs in 2024
Ransomware gangs continue to break records and BlackFog will track all new ransomware gangs in 2024.