Red Sentry Spotlight: Ransomware on the Rise Last Month

September’s cyberattacks spanned across every industry. More important than the number of breaches is the method of attack. Ransomware is becoming increasingly prevalent, and this trend shows no sign of slowing. 

Here are some of the ransomware attacks in September 2021 alone:

“What is Ransomware?”

Ransomware is malware that gains access to a victim’s information and then uses encryption to hold it for a specified amount of money. Until the ransom is met (and maybe not even then), the encryption blocks access to files, databases, applications, etc. Ransomware can spread through an entire network and quickly paralyze a company. 

Believe it or not, ransomware doesn’t even require a cyber mastermind anymore. Ransomware-as-a-Service (RaaS) now exists, which allows non-technical criminals to buy the malware straight from a developer, for a percent of the cut (which can be millions).

“It won’t happen to us”

One reason some companies don’t implement proactive cybersecurity is their (incorrect) assumption that their business wouldn’t be a good target.

Myth: Malicious hackers only target high-value companies or those in the spotlight. My business wouldn’t be on their radar. 

Fact: Cyber criminals choose targets for a lot of different reasons, and annual budget is only one of them.

Criminals may target a wealthy company because they assume it can pay a ransom, but they can just as easily go after a smaller company or a startup, assuming it’s an easy target because funds are not prioritized toward cybersecurity.

Enterprise, SMB, startup...healthcare, education, law firm…private, public, government…everyone (including you) can be a target. 

“Should we just pay the ransom?”

At the end of the day, decision makers must do what they believe is best for their organization. However, the FBI generally advises against paying these ransoms, and I agree fully. Here are some important things to consider:

Corrupted Data (if any data)

First of all, paying a ransom doesn’t guarantee the return of your data. There is an encryption key that a malicious hacker theoretically should give a company after the ransom is paid, but there is nothing to guarantee that happens. In fact, they may even leak the data to the public after payment, just because they can. 

More prevalently, even if you get the data back, some or all of it may be corrupted. Nearly half of victims who pay the ransom receive corrupted data back. 

Financial Considerations

The ransom itself can cost millions of dollars. In 2020, nearly $350 million in cryptocurrency was paid by victims. 

You can also incur civil penalties from the government for paying. The U.S. Treasury Department’s Office of Foreign Assets Control (OFAC) published an advisory in 2020 explaining that malicious cyber criminals, which include ransomware attackers, are a part of its cyber-related sanctions program. This gives OFAC the authority to impose penalties on U.S. persons who provide material assistance or support to these individuals (which can include a ransom). 

Mixed Signals

Paying a cyber ransom may seem like the only choice sometimes, but this can signal a couple of things to criminals. First, it shows them that ransomware works, so this incentivizes more attacks. In addition, it specifically shows them that YOUR organization is a good target, because you pay. In fact, it is estimated that about 80% of companies who pay cyber ransoms become victims a second time. 

Red Sentry Solution

We could talk about appropriate ransomware responses for days, but a much better solution is not letting a malicious hacker into your system in the first place. 

My company, Red Sentry, provides an automated, continuous pentesting platform that helps you monitor your cyber environment 365 days a year. This is just one example of a technology that can elevate your security to the next level. 

Conclusion

Ransomware is not going anywhere anytime soon, so businesses must harden the target on themselves as much as possible. Put effective tools in place, shore up your systems, and stay proactive. We can’t always beat malicious hackers at their own game, but we can keep them from entering the stadium. 

Learn more about SOC2 compliance.

Valentina Flores
CEO
Valentina began her career as a police detective, assigned to a federal taskforce and eventually landing in cybercrimes. Red Sentry has created a hybrid approach that allows businesses to get a thorough manual pentest quickly, while also utilizing the Red Sentry software, to ensure year around security.

Schedule a Pentest:

Penetration Testing

Start a Free Trial:

Vulnerability Scanner