In 2021, there was a significant increase in the use of ransomware against businesses in the United States, United Kingdom and Australia.
Ransomware is malware that encrypts user data and grants network access to threat actors. Once they gain access to a company's data, they threaten to release sensitive information and disrupt business operations until the victim pays a ransom, hence the name.
Unfortunately, paying the ransom does not guarantee that the threat actor will unlock your files or that your data will be safe. In fact, the U.S. government's Cybersecurity and Infrastructure Security Agency (CISA) does not recommend paying ransom at all, as the more profitable ransomware becomes, the more common and complex it could become.
Instead, ICAR, along with the United Kingdom's National Cyber Security Centre (NCSC-UK) and the Australian Cyber Security Centre (ACSC), have made recommendations to prevent ransomware attacks and minimize their impact.
The increase in ransomware attacks can be attributed to the COVID-19 pandemic in several ways. First, the use of cloud-based networks sensitive information and critical infrastructure accessible to malicious actors on the web. Second, the pandemic lowered incomes for many households as lockdowns and supply chain issues persisted, making illicit online activities - such as using ransomware - an easier way to make money.
As ransomware becomes more profitable and accessible, hacker organizations are becoming more complex. There are now entire organizations with customer support services that walk victims through the process of paying ransom and decrypting their files.
These companies increased their profitability by selling stolen data to other crooks. This means that once a victim's data was stolen, multiple criminal organizations could use it to threaten and extort them.
How can ransomware get into my network?
The most common strategy employed by threat actors is phishing. Phishing is a scare tactic in which cybercriminals pose as a legitimate entity, such as the IRS, law enforcement, or anti-spam software, and contact individuals to inform them of a problem - for example, a problem with their last tax return, an arrest warrant, or, ironically, a security breach in their network.
To solve the problem, they ask victims to click on a link, which then downloads ransomware to the user's computer, giving the threat actor access to their data and network.
Here are the steps that CISA, ACSC and NCSC-UK recommend a company take to prevent ransomware attacks:
Above all, they recommend not paying the ransom, as this would encourage cybercriminals to continue using ransomware to extort money.
If ransomware gets into your company's network, it's important to act quickly and follow these best practices:
While ransomware has become more common in the age of the home office, your business can take steps to prevent and recover from attacks. By responding quickly to security breaches and reporting them, you minimize both their impact on your business and the likelihood of them happening again.