WannaCry ransomware took the cybersecurity scene by storm last Friday (May 12th), becoming the fastest spreading ransomware to-date. Now that it is nearly a week later, we want to provide some takeaways on WannaCry. What happened, what did we learn, and what does the future look like?
Cyber criminals are using an exploit kit to distribute the fastest spreading ransomware to-date. The ransomware being distributed is WannaCry 2.0 but is also referenced to as WannaCrypt0r, Wanna Decryptor, and WCry.
As of now, 48 states, the District of Columbia, Guam, Puerto Rico and the Virgin Islands have implemented legislation that requires private or government entities to notify individuals if they have experienced a security breach. Alabama, New Mexico, and South Dakota are the three remaining states who don’t have official security breach notification laws. Even my Midwestern home-state of Iowa now has a mandatory data breach notification law.
In a recent webinar hosted by WatchPoint, CEO Greg Edwards and Chief Hacking Officer Nathan Studebaker explained fileless malware. Fileless malware is a tactic that we have seen professional hackers use more and more over the last six months. In fact, the last quarter of 2016 saw a 33% increase in the distribution of fileless malware.
A Google Docs phishing scheme is taking the internet by storm this week. A client of ours received an email from one of their colleagues similar to the screenshot below.
April was an extremely busy month in the world of ransomware. There are several new ransomware variants that look like they are going to stay around for a while. Cerber has taken over the reigns as the most distributed ransomware. However, Locky is looking to come back strong after its demise in 2016. We have also added several decryptors to our list, which is the largest you’ll find on the internet. The best news about ransomware in April is it looks like there weren’t any new attack vectors for Android users.
At WatchPoint, we are proud to have the largest list of ransomware decryptors on the internet. However, it’s important to know that the majority of ransomware variants do not have a decryptor available.
A new ransomware called Mole has been found, and it appears to be a version of the CryptoMix family. Additionally, Mole has many similarities to the Revenge and CryptoShield variants which are also members of the CryptoMix strain.
A new ransomware that appends .wallet to the end of encrypted files has appeared over the last couple of weeks. After further research, it has been determined that this is a newer variant of CrySiS ransomware called Dharma.
In 2016, several hospitals and healthcare organizations were hit with ransomware attacks. In fact, between October 2016 and February 2017, 42.77% of cyberattacks targeted healthcare organizations. With ransomware attacks predicted to quadruple by 2020, cybersecurity spending is also predicted to exceed $65 billion for the healthcare industry.