{"id":5866,"date":"2016-08-09T15:12:50","date_gmt":"2016-08-09T15:12:50","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=5866"},"modified":"2020-02-26T11:10:31","modified_gmt":"2020-02-26T16:10:31","slug":"anti-ransomware","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/anti-ransomware\/5866\/","title":{"rendered":"If not us, then who"},"content":{"rendered":"<p>Cryptographic ransomware that blocks access to important files and demands ransom has recently grown into an urgent problem. That is why Kaspersky Lab pays close attention to encryptors, and our experts work hard to develop specific tools to counter this threat.<\/p>\n<p>Extortionists are particularly harmful to SMBs, which seldom can implement serious defenses against cyberthreats. According to an IT Security Risks 2016 survey, over the last year more than 42% of small and medium-size companies were attacked by ransomware. A third of these enterprises had to pay the ransom, and about 18% of the companies failed to restore their lost data even after paying the ransom. At the same time, according to <a href=\"https:\/\/securelist.com\/analysis\/publications\/75145\/pc-ransomware-in-2014-2016\/?utm_medium=blg&amp;utm_source=kb_post_160809&amp;utm_campaign=ww_promo\" target=\"_blank\" rel=\"noopener\">Kaspersky Security Network<\/a>, the number of corporate users attacked by cryptors has increased almost sixfold \u2014 from 27,000 in 2014\u20132015 to 158,600 in 2015\u20132016.<\/p>\n<p>Ransomware keeps gaining in popularity among cybercriminals primarily because of its efficiency \u2014 even one infected corporate computer can bring in a substantial profit. The problem for victims is compounded by the fact that even after the infected computer has been cleaned, the victim may still face encrypted files that they can\u2019t restore. Moreover, many security solutions are powerless against attacks from the most recent versions of ransomware.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>Beating #ransomware:\u00a0If not us, then who<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fq4B1&amp;text=Beating+%23ransomware%3A%C2%A0If+not+us%2C+then+who\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Our security solutions effectively fight ransomware by neutralizing encrypting Trojans before they can do any harm. However, after we made sure that our customers were protected, we decided to go further: We released a special free Kaspersky Anti-Ransomware Tool for Business, which can protect users of other security solutions. The tool is as intolerant of any type of ransomware as it is friendly to the security solutions of other vendors. That is, if you launch it on a computer with another antivirus installed, the applications won\u2019t interfere with one another.<\/p>\n<p>You may reasonably ask why we decided to help our competitors. Well, to begin with, we believe that dealing with the problem of encryptors requires united forces. Good against evil, if you like. And the development of an application complementing the functionality of alternative solutions is not our first move in this direction. We recently launched the <a href=\"https:\/\/business.kaspersky.com\/no-more-ransom-a-global-threat-requires-international-cooperation\/5803\/\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom initiative<\/a> together with the police of the Netherlands, Europol, and Intel Security to increase awareness of the problem and assist the victims of extortionists. As well, we have an interest in protecting all users from cyberthreats because anyone paying ransom further funds the creation of new malware.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>\u00a0Our\u00a0tool is as intolerant of any type of #ransomware as it is friendly to the security solutions of other vendors.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fq4B1&amp;text=%C2%A0Our%C2%A0tool+is+as+intolerant+of+any+type+of+%23ransomware+as+it+is+friendly+to+the+security+solutions+of+other+vendors.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>Kaspersky Anti-Ransomware Tool for Business is a \u201clight\u201d solution that can function in parallel with other antivirus software. The tool uses two components needed for the early detection of Trojans: the distributed <a href=\"https:\/\/www.kaspersky.com\/images\/KESB_Whitepaper_KSN_ENG_final.pdf\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Security Network<\/a> and <a href=\"https:\/\/www.kaspersky.com\/images\/Kaspersky_Lab_Whitepaper_System_Watcher_ENG.pdf\" target=\"_blank\" rel=\"noopener nofollow\">System Watcher<\/a>, which monitors applications\u2019 activity.<\/p>\n<p>Kaspersky Security Network quickly checks the reputation of files and website URLs through the cloud, and System Watcher monitors the behavior of programs and provides proactive protection from yet-unknown versions of Trojans. But most important, our tool can back up files opened by suspicious applications and roll back the changes if the actions taken by programs prove malicious. You can read more <a href=\"http:\/\/media.kaspersky.com\/pdf\/Kaspersky_Lab_Whitepaper_Cryptoprotection_final_ENG.pdf\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a> on the principles of this technology.<\/p>\n<p>You should understand that this free tool can\u2019t replace full-featured products such as <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/small-to-medium-business?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Endpoint Security for Business<\/a> or <a href=\"https:\/\/www.kaspersky.com\/advert\/business-security\/small-office-security?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk____ksos_v4__\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Small Office Security<\/a>. However, it can serve as an additional security layer together with other security solution and strengthen the defenses of a corporate information infrastructure. Download the application <a href=\"https:\/\/go.kaspersky.com\/Anti-ransomware-tool_soc.html\" target=\"_blank\" rel=\"noopener nofollow\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Kaspersky Security Network, the number of corporate users attacked by cry\u0437tors has increased almost sixfold \u2014 from 27,000 in 2014\u20132015 to 158,600 in 2015\u20132016.<\/p>\n","protected":false},"author":308,"featured_media":15313,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[2451,1680,420,97],"class_list":{"0":"post-5866","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-anti-ransomware","10":"tag-cryptors","11":"tag-ransomware","12":"tag-security-2"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/anti-ransomware\/5866\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/anti-ransomware\/7953\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/anti-ransomware\/5866\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/anti-ransomware\/5866\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/anti-ransomware\/","name":"anti-ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/308"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=5866"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5866\/revisions"}],"predecessor-version":[{"id":33724,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/5866\/revisions\/33724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15313"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=5866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=5866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=5866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}