![]() We’ve also seen malware designed to target the smaller network environments of SMBs. This independent report maintains that the number of attacks is eight times higher in 2016 than during the same time in 2015. Ransomware attacks on small and medium businesses grew exponentially this past year. Creators took 20% of the ransom collected while distributors got 80%. ![]() Shark also had a guide on customization, distributor tips on how much ransom to demand, and other useful documents. One example is the Shark ransomware that was hosted on a public WordPress site, and not the usual anonymous network typically favored by other ransomware authors. By enlisting a large network of distributors, ransomware is spread to more victims, which equates to a bigger potential for profit for its creators. Established variants gave way to new RaaS that use a different business model with lower license prices and software that allowed less tech-savvy distributors to spread ransomware.Ĭreators earn money by taking a cut from the distributors of their ransomware, and as RaaS becomes cheaper and easier to find, it has become more mainstream. Operators of Ransomware-as-a-Service (RaaS) also shifted gears this year. While the staff was able to isolate some of the affected machines so that most systems were operational, the university decided that it was the best course of action to pay the $20,000 demanded by the attackers because of the risk to critical data and valuable research. In late May, a ransomware attack crippled multiple systems connected to the university’s network. The ransom was set at 45 bitcoins (around $19,000) with a ten-day deadline, but MedStar was reportedly able to bring their systems back online without paying. The organization acted quickly and took down all system interfaces to prevent the malware from spreading. MedStar is one of America’s leading healthcare providers with a network of ten hospitals and 250 outpatient centers under its name-many of which were affected as ransomware attackers paralyzed their systems in late March. The systems were down for more than a week before the hospital reportedly paid the ransom of 40 Bitcoins, which amounted to $17,000. The attack heavily affected the facility's daily operations, as urgent scans, lab work, pharmaceutical needs, and documentation couldn't be processed. In early February, the Hollywood Presbyterian Medical Center was hit by a ransomware attack that knocked the hospital’s network offline.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |