Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 30 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Ransomware expected to be built into exploit kits next year

by The Gurus
October 5, 2020
in Editor's News
Share on FacebookShare on Twitter

Exploit kits and botnets will begin to spread mass-produced ransomware in 2014

According to the Sophos security threat report, botnets will deliver more ransomware as users grow more resistant to fake alerts and anti-virus scams. Its statistics for June 2013 found that 29 per cent of exploit kits carry some kind of ransomware, in particular Glazunov that Sophos said had “become notorious for delivering dangerous ransomware”.

The report said: “It’s hard to predict what form future attacks will take – but we can imagine ransomware taking hostage not just your local documents, but any type of cloud-hosted data. These attacks may not require data encryption and could take the form of blackmail – threats of going public with your confidential data.”

Report author James Lyne, global head of security research at Sophos, told BBC News that there was evidence that many cyber thieves were keen to cash in on the success of ransomware programs such as Cryptolocker, as crooks seek criminally-minded software developers to write a kit that anyone could use to create their own mass-produced version of this type of malware.

Robert Hansen, security evangelist at WhiteHat Security, told IT Security Guru that there has always been a natural gravitation towards money-making activities that exploit fear, uncertainty and doubt that users have.

“This has been around since I got on the internet, so I don’t see it going anywhere,” he said. “It can take many forms from saying it can take down your website to saying we found you went to an adult site, I think it is a natural progression as it is an easy thing to add on top.”

Tim ‘TK’ Keanini, CTO at Lancope, said: “It used to be the case that you needed both the will and the skill to be a effective cybercriminal; now you just need the will and some bitcoins. The black market now has any exploit, evasion method, stolen credential, DDoS and distribution method available.

“Cyber criminals can simply “add to cart” their attacks. We need to make it too expensive for them to operate, and that simply is not happening yet.  If you are still worried about being attacked, chances are you have already been compromised and you just don’t know it yet.

“Back in the day there were the “script kiddies”.  Those that wanted to hack sites but had to do it the Fisher Price way. I think we need to help the public with a new term – This new cyber criminal that buys all their skills we call ‘script crimie'”

FacebookTweetLinkedIn
Tags: BotnetExploitRansomware
ShareTweet
Previous Post

Malware uses SaaS model in hosted database

Next Post

CertiVox confirms it withdrew PrivateSky after GCHQ issued warrant

Recent News

Guide to ransomware and how to detect it

Guide to ransomware and how to detect it

September 28, 2023
software security

Research reveals 80% of applications developed in EMEA contain security flaws

September 27, 2023
Cyber insurance

Half of organisations with cyber insurance implemented additional security measures to qualify for the policy or reduce its cost

September 27, 2023
Fraud and online banking

Akamai Research Finds the Number of Cyberattacks on European Financial Services More Than Doubled in 2023

September 27, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information