Whitepaper: Ransomware, Mitigation, Detection, and Response
Of all recent technologies being hyped, the one to have the greatest impact on the future of the world economy likely will be Blockchain. While the benefits of having a decentralized cloud-based ledger to record transactions will revolutionize currencies, fund transfers, trading, voting and contracts, there is some serious negative cyber security fall-out as well that shouldn’t be overlooked.
As technology innovations increase, so does the attack surface and new opportunities for attackers. Ransomware continues to make a widespread impact, while ransomware-like tactics are on the rise. Still, as damaging as ransomware attacks are, the biggest change is now underway as attackers seek to silently commandeer the computing power of the machines under their control, enslaving them to become producers of coin unbeknownst to the system owners – cryptojacking.
Recently, Drupageddon 2.0 set corporate web teams scrambling to patch their content management systems before attackers could get in. Shortly after Drupal released the patch, tools were being weaponized. Of course, your organization may never know you’re doing the attackers’ bidding, as they no longer lock the screen demanding payment. In fact, they are incentivized now to suck only as much processing power as they can without raising alarms, thereby increasing their dwell time. Unfortunately, now that this business model has been proven, we expect to see a rise in the malicious use of bots and malware variants to covertly start cryptojacking campaigns.
To find out what your organization can do to combat the latest cryptojacking and ransomware attacks, this whitepaper has some best practices to consider.