Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 4 February, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Kroll Ontrack warns that ransomware attacks on corporate virtual drives are on the rise

by The Gurus
September 9, 2015
in Editor's News
Ransomware
Share on FacebookShare on Twitter

Kroll Ontrack, the data recovery and ediscovery services provider, reports that it is receiving a growing number of enquiries from corporates about how to recover from ransomware attacks.
While ransomware is not new, attacks have tended to focus in the past on home and small business computers and, increasingly, on mobile devices.  According to Kroll Ontrack, these attacks tend to happen in different clusters or strands that die out after about a month as anti-virus programmes are updated to deal with them.
Methods adopted by ransomware hackers have evolved over time, from encrypting user files in a simple zip file to crypto-locker and Curve-Tor-Bitcoin (CTB) Locker technologies, of which the latter is used by criminals to encrypt and hide user data through the Tor network. Attacks tend to originate in regions where cyberattack legislation is absent or immature such as Africa, rather than the Europe and North America.
The new attacks on corporate systems involve hackers deleting virtual drives completely and replicating the files on their own servers.  The first time the companies know about the attack is when they find a note from the hacker where the virtual drives used to be, criticising their security arrangements and requesting payment for return of the data or threatening to sell it on the open market. In a recent case dealt with by Kroll Ontrack, payment was demanded in the virtual currency Bitcoins in exchange for stolen data within two weeks or the user’s information would be auctioned off. Kroll Ontrack was successfully able to recover the customer’s data saving them from having to surrender to the demands of the criminals.
Shane Denyer, Data Recovery Engineer at Kroll Ontrack said: “The methods used in ransomware attacks are constantly evolving, but our engineering team have developed their own methods to retrieve and restore data which mean that companies avoid having to make payments to criminal gangs just to get their information back.  We are seeing a definite move away from attacks that target large numbers of small business or home users towards more of a spearfishing approach where individual, larger corporations come under fire.”
Kroll Ontrack advises corporates to avoid ransomware attacks by:

  • Always keeping anti-virus software up-to-date;
  • Creating regular back-ups of corporate data on devices outside the network; and
  • Storing additional back-ups of virtual drives on devices at a different location

Denyer concludes: “Earlier versions of ransomware have been broken down and antidotes are readily available. However, we are seeing more and more attacks on corporate systems and predict that there will be even more incidents as ransomware technologies continue to develop.  The key is to ensure that data is always backed up on a regular basis and that reputable partners are involved in restoring data that is hacked.”

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

246 million records compromised worldwide according to Gemalto’s Breach Level Index report

Next Post

WhatsApp Vuln Opens Door to Hackers

Recent News

london-skyline-canary-wharf

Ransomware attack halts London trading

February 3, 2023
Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

Ransomware conversations: Why the CFO is pivotal to discussing and preparing for risk

February 2, 2023
JD Sports admits data breach

JD Sports admits data breach

January 31, 2023
Acronis seals cyber protection partnership with Fulham FC

Acronis seals cyber protection partnership with Fulham FC

January 30, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information