{"id":6728,"date":"2017-04-04T16:55:21","date_gmt":"2017-04-04T20:55:21","guid":{"rendered":"https:\/\/kasperskydaily.com\/b2b\/?p=6728"},"modified":"2020-02-26T11:11:31","modified_gmt":"2020-02-26T16:11:31","slug":"ransomware-in-targeted-attacks","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com\/blog\/ransomware-in-targeted-attacks\/6728\/","title":{"rendered":"Eight targeted ransomware attacks aiming for your money"},"content":{"rendered":"<p>Cryptomalware has long been a threat not only to end users, but to companies as well. At first, their authors extorted money using mass-mailed Trojans. Then cybercriminals realized that businesses are much more likely than individuals to have valuable information \u2014 and money with which they are ready to part for the sake of business continuity. So they switched from mass mailings to selective ones, and began to spam small and medium-size businesses with false \u201cbills,\u201d letters from the \u201cIRS,\u201d and other misleading documents containing malicious code. And now we have seen the next level \u2014 targeted attacks that employ encrypted malware.<\/p>\n<p>It wasn\u2019t much of a surprise. This evolution is extremely logical: If you carefully select a victim, examine its infrastructure, and encrypt specific business-critical files, your chances of obtaining a solid ransom increase dramatically. Our analysts long foresaw such a development of ransomware. The surprise is the scale of this phenomenon.<\/p>\n<p>At this moment, our experts have identified at least eight threat actors competing for the right to extort money from businesses. In some cases, the price of decryption reaches half a million dollars. And their main targets are financial organizations, which have to pay to ensure that their data servers can return to work.<\/p>\n<p>One of the reasons for such a rapid popularity gain is a code of silence. Victims can be extremely reluctant to report that their confidential data has been encrypted. As a result, before a target campaign becomes known to all software vendors, it will have had enough time to reach a lot of victims. And that is a big problem because not all protective products can detect cryptors by behavior (although ours does).<\/p>\n<p>Therefore, if you become a victim of encrypting ransomware, you must immediately inform law enforcement about the incident. If you need tips on how to do it, or any other advice on protecting against this sort of threat, visit the <a href=\"https:\/\/www.nomoreransom.org\/about-the-project.html\" target=\"_blank\" rel=\"noopener nofollow\">No More Ransom<\/a> initiative website. In addition, it makes sense to use <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/intelligence-services?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">expert services<\/a>, which can conduct a full investigation of the incident. A variety of utilities for decrypting data when it\u2019s possible is also available on the <a href=\"https:\/\/NoRansom.kaspersky.com\" target=\"_blank\" rel=\"noopener\">NoRansom.kaspersky.com<\/a> website.<\/p>\n<p>Details about the variety of targeted attacks that employ ransomware can be found in the expert study on our Securelist website.<\/p>\n<h2>Standard tips for protecting against ransomware<\/h2>\n<ul>\n<li>Back up business-critical information and <a href=\"https:\/\/www.kaspersky.com\/advert\/small-to-medium-business-security\/storage?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk____storage___\" target=\"_blank\" rel=\"noopener nofollow\">protect the servers<\/a> on which backups are stored.<\/li>\n<li>Use security solutions that can detect attempts at behavioral encryption \u2014 for example, our free Kaspersky Antiransomware tool.<\/li>\n<li>Maintain a high level of <a href=\"https:\/\/www.kaspersky.com\/advert\/enterprise-security\/cybersecurity-awareness?redef=1&amp;THRU&amp;reseller=gl_kbusinesspost_pro_ona_smm__onl_b2b_kbusiness_lnk_______\" target=\"_blank\" rel=\"noopener nofollow\">cybersecurity awareness<\/a> \u2014 many attacks still use social engineering technologies.<\/li>\n<li>We also highly recommend you get acquainted with our <a href=\"https:\/\/go.kaspersky.com\/Ransomware-eBookSOC.html?utm_source=smm_kb&amp;utm_medium=ww_kb_o_170327\" target=\"_blank\" rel=\"noopener nofollow\">advice on guarding against cryptoransomware<\/a>.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/sas.kaspersky.com\/?utm_medium=blg&amp;utm_source=kb_banner_170206&amp;utm_campaign=ww_saslp\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-6722\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2017\/04\/06020709\/SAS-Banner-KB.png\" alt=\"Security Analyst Summit\" width=\"1460\" height=\"300\"><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our experts have identified at least eight independent threat actors competing for the right to extort money from businesses.<\/p>\n","protected":false},"author":700,"featured_media":15206,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1999,3052],"tags":[282,420,337,1980,2492],"class_list":{"0":"post-6728","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-business","8":"category-smb","9":"tag-cybersecurity","10":"tag-ransomware","11":"tag-sas","12":"tag-sas-2017","13":"tag-targeted-attack"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-in-targeted-attacks\/6728\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-in-targeted-attacks\/15070\/"},{"hreflang":"pl","url":"https:\/\/plblog.kaspersky.com\/ransomware-in-targeted-attacks\/7004\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-in-targeted-attacks\/15162\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-in-targeted-attacks\/6728\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-in-targeted-attacks\/6728\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com\/blog\/tag\/sas\/","name":"SAS"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/700"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=6728"}],"version-history":[{"count":3,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6728\/revisions"}],"predecessor-version":[{"id":33757,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/6728\/revisions\/33757"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/15206"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=6728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=6728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=6728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}