Ransomware attacks are, simplified, the data and files block and the collection of values to return access to your files and information. This virtual threat is an increasingly common and disseminated criminal practice all over the planet.
In other words, ransomware attacks are the digitization of the crime of kidnapping , in which the hostage is virtual: freedom of access to data and files . That is, real people are prevented from accessing their digital assets in their own equipment, networks and systems.
In fact, ransomware attacks are real threats and a cybercrime patrimonial of the “virtual world” that cause concern, mainly, the priority targets of hackers: companies and governments .
Undoubtedly, the choice of companies and the public power for ransomware attacks is due to the ability to pay and abundance of sensitive and confidential data in these sectors.
With the growing number of attacks on systems and networks, maintaining internet security should be a day -to -day concern of companies and governments.
See what were the most recent and commented ransomware attacks in Brazil
Probably the largest and most talked about ransomware attacks that occurred to Renner stores , JBS , the National Treasury and even amazing hospitals .
The CNN Journal of August 21, 2021, a good report on the incident that took the website of Renner stores, which occurred and reported two days earlier, on August 19, 2021.
In addition to the news, the report brought data and alarming information about ransomware attacks. According to CNN Brazil and its sources, the appetite and voracity of hackers grew during the pandemic .
Watch the video below and follow the full report. You will find that, among other numbers, the amount required by cyber criminals and paid by companies to recover access to blocked data grew 82% compared to 2020.
Evolution of techniques and values required in ransomware attacks
The G1 portal has also entered the subject and published Ransomware: Understand how the virus is used in extortion and learn how to protect itself , signed by Victor Hugo Silva and Rafael Miotto.
The content is made up of a small story and a video. Thus, it explains how a ransomware attack is used to extort money and cites the case of the world's largest meat processor, JBS .
In addition, among other information, it brings an interesting chronology of the evolution of the techniques and values required in ransomware attacks , which we reproduce below.
- 2009: GPCode blocked the computer and released unlocking key after the victim sent an SMS , which was charged by cybercriminals in the telephone account.
- 2013: Cryptolocker stood out by adopting Bitcoin as a means of redemption payment between $ 500 and $ 1,000, and reaching unqualified encryption.
- 2015: Teslacrypt was rescue to release game files.
- 2016: Petya acted directly on the hard disk, not just the files , to prevent system startup.
- 2017: Wannacry charged $ 300 per victim and even raised $ 60,000.
- 2018: Atlanta city systems were affected by a $ 50,000 ransomware in Bitcoin.
- 2021: Part of a new wave of rescue viruses that adopt specific strategies for each victim, Ryuk charges between $ 600,000 and $ 10 million to release access to systems .
- 2021: Darkside charged $ 5 million to release the colonial pipeline system.
- 2021: The Revil group was appointed as responsible for the JBS attack , which resulted in the rescue of $ 11 million.
Before watching the video below, it is good to remember that in order to avoid traceability , usually the payment of ransomware attacks are required in cryptocurrencies, especially in bitcoin.
Above all, this form of operationalization of extortion is imposed because deposits and payments made with cryptocurrencies are anonymous and impossible to be tracked . This facilitates and encourages the practice of ransomware attacks.
How to protect yourself from ransomware attacks and data kidnapping?
This was exactly the theme of the Ransomware article and data kidnapping: how to protect , that Lumiun Technology co -founder Heini Thomas Geib wrote to Lumiun Blog .
Objectively and didactically, the article explains how ransomware attacks occur and, especially, informs about the main preventive measures and how to proceed after the files block .
Above all, it reinforces how it is to be prevented against ransomware attacks while being prepared for continuing activities after an incident .
Know for better fight
General Sun Tzu 's teachings, guidelines, and principles in The Art of War , are the best for facing the virtual threat of ransomware attacks. Among them, we highlight three.
According to him, first, we need to know the enemy to combat him . Then, in knowing it, the important thing is to attack the enemy's strategy .
Just to illustrate, ransomware attacks are performed by hackers using malicious code software to prevent access to data and information through encryption .
In fact, this modus operandi defines the two existing ransomware types. Locker type attack . In contrast, when it encrypts data, it is a Crypto attack .
Once encrypted, files, hardware, networks, and systems that contain, this data and information is only unlocked by a single access key .
Thus, cybercriminals guarantee bargaining power over the victims. Not only from individuals, but they can also extort from companies and governments .
As a ransomware attack is triggered, it systems vulnerabilities infects devices through malicious links or files.
Preventing is better than remedy
Undeniably, popular sayings have great appeal and foundation. In this sense, against harmful actions caused by ransomware attacks and other viruses and malware, prevention is critical .
For sure, against virtual threats and cyber crimes that endanger data sensitive data, networks and systems, the best practice and the best investment are to prevent and avoid .
In this sense, the third highlight is perfectly fits the philosophy of Sun Tzu: to defeat the enemy without having to "fight."
However, there are no guarantees in this type of situation. Even more because it is not always possible to reverse or regain all data and files.
After all, resigning yourself to the payment of a redemption to cybercriminals does not mean that they will unlock their files or equipment .
Main care against ransomware attacks
Undoubtedly, the two most effective verbs regarding virtual threats are preventing and protecting !
As a result, there are two main solutions against ransomware attacks. Firstly, it prevents: Internet access control . Secondly, it protects: the systematic realization of backups .
The Lumiun Tecnologia has know-how and technology to contribute to preventing ransomware attacks. Above all, because the Lumiun Internet Access Control is complete and effective to avoid downloading harmful software.
In a single cloud platform, Lumun customers have control of internet access , firewall and business vpn . Much more security and productivity on your company's internet.
Likewise, maximum attention is required to protect, backup! As an ideal strategy, the existence of a security copy in a separate place from the origin of the data should be operationalized.
Other care against digital kidnappings
After main care against ransomware attacks are implemented. Other care against virtual kidnapping, even more basic, is necessary and always welcome.
In principle, these are basic issues and tips, ranging from user education to information security :
- Beware of emails and fake websites : Users should be educated about their responsibility for company data and information.
- Internet Access Control : Define which user groups will have access to which types of websites. Avoid the use of inappropriate, inadequate or harmful websites. This helps in the protection of the network against phishing and the spread of malware, such as ransomware attacks.
- Antivirus : Good antivirus software is essential. It must always be up to date and configured to perform periodic scanning.
- Software Updates : Maintaining updated operating systems, software and applications avoids.
- Access permissions : It is important to have a policy on this topic well defined. Also, it is necessary to check the level of access that each user or user group needs in relation to the files shared on the network.
- Administrative level user accounts : Similarly, the general use of administrative level user accounts should be avoided for the purpose of harm reduction.
Finally, the internalization of the relevance of this theme in organizational culture is mandatory. Above all, because prevention and protection against ransomware attacks need to be really .