Removing ransomware is a multi-step process.
A major cyber-attack is spreading across Europe today (June 27th), shutting down several firms across the continent. The ransomware appears to be a new strain of Petya, which is inspired by the WannaCry outbreak that occurred last month. While the initial outbreak of Petya appears to be smaller than WannaCry, over eight countries have already been affected.
A new ransomware family has recently been discovered that incorporates a combination of fileless attack and code-injection. Dubbed Sorebrect, the fileless ransomware is targeting enterprises, instead of individual users.
A lot of people are looking for that next big investment that will make them millions. Well, a headline about Bitcoins caught my attention the other day: If You Invested $100 in Bitcoin in 2010, You’d Be Worth $72 Million Now. That’s a 720,000% return on investment.
WannaCry ransomware took the cybersecurity scene by storm last Friday (May 12th), becoming the fastest spreading ransomware to-date. Now that it is nearly a week later, we want to provide some takeaways on WannaCry. What happened, what did we learn, and what does the future look like?
Cyber criminals are using an exploit kit to distribute the fastest spreading ransomware to-date. The ransomware being distributed is WannaCry 2.0 but is also referenced to as WannaCrypt0r, Wanna Decryptor, and WCry.
April was an extremely busy month in the world of ransomware. There are several new ransomware variants that look like they are going to stay around for a while. Cerber has taken over the reigns as the most distributed ransomware. However, Locky is looking to come back strong after its demise in 2016. We have also added several decryptors to our list, which is the largest you’ll find on the internet. The best news about ransomware in April is it looks like there weren’t any new attack vectors for Android users.
At WatchPoint, we are proud to have the largest list of ransomware decryptors on the internet. However, it’s important to know that the majority of ransomware variants do not have a decryptor available.
A new ransomware called Mole has been found, and it appears to be a version of the CryptoMix family. Additionally, Mole has many similarities to the Revenge and CryptoShield variants which are also members of the CryptoMix strain.
Ransomware attacks have beome a grave threat to businesses across the world. Cybercriminals use data encrypting ransomware to hold a companies data hostage until a ransom of hundreds or several thousand dollars has been paid. Since a majority of ransomware attacks are delivered to your end users in email, it's important to educate your end users of the danger that ranomware poses and what they can do to help protect the company from ransomware. Here is a short letter you can email your employees to inform them of the dangers of ransomware.