WannaCry ransomware took the cybersecurity scene by storm last Friday (May 12th), becoming the fastest spreading ransomware to-date. Now that it is nearly a week later, we want to provide some takeaways on WannaCry. What happened, what did we learn, and what does the future look like?
Cyber criminals are using an exploit kit to distribute the fastest spreading ransomware to-date. The ransomware being distributed is WannaCry 2.0 but is also referenced to as WannaCrypt0r, Wanna Decryptor, and WCry.
As of now, 48 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have implemented legislation that requires private or government entities to notify individuals if they have experienced a security breach. Alabama, New Mexico, and South Dakota are the three remaining states who don’t have official security breach notification laws. Even my Midwestern home-state of Iowa now has a mandatory data breach notification law.
In a recent webinar hosted by WatchPoint, CEO Greg Edwards and Chief Hacking Officer Nathan Studebaker explained fileless malware. Fileless malware is a tactic that we have seen professional hackers use more and more over the last six months. In fact, the last quarter of 2016 saw a 33% increase in the distribution of fileless malware.
A Google Docs phishing scheme is taking the internet by storm this week. A client of ours received an email from one of their colleagues similar to the screenshot below.
April was an extremely busy month in the world of ransomware. There are several new ransomware variants that look like they are going to stay around for a while. Cerber has taken over the reigns as the most distributed ransomware. However, Locky is looking to come back strong after its demise in 2016. We have also added several decryptors to our list, which is the largest you’ll find on the internet. The best news about ransomware in April is it looks like there weren’t any new attack vectors for Android users.
At WatchPoint, we are proud to have the largest list of ransomware decryptors on the internet. However, it’s important to know that the majority of ransomware variants do not have a decryptor available.
A new ransomware called Mole has been found, and it appears to be a version of the CryptoMix family. Additionally, Mole has many similarities to the Revenge and CryptoShield variants which are also members of the CryptoMix strain.
Ransomware attacks have beome a grave threat to businesses across the world. Cybercriminals use data encrypting ransomware to hold a companies data hostage until a ransom of hundreds or several thousand dollars has been paid. Since a majority of ransomware attacks are delivered to your end users in email, it's important to educate your end users of the danger that ranomware poses and what they can do to help protect the company from ransomware. Here is a short letter you can email your employees to inform them of the dangers of ransomware.
Cybercriminals stooped to new lows this week after the death of Aaron Hernandez. It was reported yesterday that the former New England Patriots tight end and convicted murderer committed suicide in his jail cell. Aaron took his life the same day the 2017 Super Bowl champion New England Patriots were invited to meet with President Donald Trump in the White House. The fall from grace of Aaron Hernandez was widely recounted in the news media starting June 26, 2013, with his arrest and charge of murder for the death of Odin Lloyd. Things never got better for Aaron. Just one day before his alleged suicide Hernandez was charged with two previous murders and implicated in the shootings of three other individuals in two separate incidents dating back to when Aaron attended college.