Security

Ransomware attacks rise 10.5% between July and December 2016: Check Point

Bhaskar Bakthavatsalu MD Check Point India and SAARC
Bhaskar Bakthavatsalu MD Check Point India and SAARC

In the second half of 2016 ransomware attacks doubled with the percentage increasing from 5.5% to 10.5% between July and December 2016, revealed cyber security firm Check Point’s H2 2016 Global Threat Intelligence Trends.

The H2 2016 Global Threat Intelligence Trends Report highlights the key tactics cyber-criminals are using to attack businesses, and gives a detailed overview of the cyber-threat landscape in the top malware categories – ransomware, banking and mobile. It is based on threat intelligence data drawn from Check Point’s ThreatCloud World Cyber Threat Map between July and December 2016.

“The core issue with ransomware is the general lack of strong pro-active security practices. The ability of hackers to receive payments via Bitcoin has greatly improved ransomware’s effectiveness. To effectively deal with zero-day ransomware, a multi-layered security architecture is the need of the hour. While real-time behavioral analysis to identify attacks before they begin to encrypt data is required, it is equally important to track down ransomware that evades the initial analysis,” said Bhaskar Bakthavatsalu, MD, Check Point, India and SAARC. “A layered approach also ensures that the malware is quarantined, forensic analysis is done and the encrypted data is restored. It is time to look to the future and start preparing for what lies ahead,” he added.

Key trends

Check Point researchers detected a number of key trends during the period:

  • The Monopoly in the Ransomware Market – thousands of new ransomware variants were observed in 2016, and in recent months we witnessed a change in the ransomware landscape as it became more and more centralized, with a few significant malware families dominating the market and hitting organizations of all sizes.
  • DDoS Attacks via IoT Devices – in August 2016, the infamous Mirai Botnet was discovered – a first of its kind- the Internet-of-Things (IoT) Botnet, which attacks vulnerable Internet-enabled digital such as video recorders (DVR) and surveillance cameras (CCTV). It turns them into bots, using the compromised devices to launch multiple high-volume Distributed Denial of Service (DDoS) attacks. It is now clear that vulnerable IoT devices are in use in almost every home, and massive DDoS attacks that are based on such will persist.
  • New File Extensions Used in Spam Campaigns – the most prevalent infection vector used in malicious spam campaigns throughout the second half 2016 was downloaders based on Windows Script engine (WScript). Downloaders written in Javascript (JS) and VBScript (VBS) dominated the mal-spam distribution field, together with similar yet less familiar formats such as JSE, WSF, and VBE.

Most Popular

The Red Mark has been established as a news portal to act as a conduit between the booming startup economy and the established, traditional players. Today's startups are tomorrow's small and medium business or large enterprise and we believe that no one can afford to be an island; if both work in tandem they can learn a lot from each other.

Contact Us

Address : 570, first floor, sector 22B , Gurgaon - 122015

Contact No. : 0124-4377494

For Any Query Please write below


Editorial : karma@theredmark.net

Advertisement : hem@theredmark.net

Subscribe to Our Newsletter





CAPTCHA


copy the digits from the image into this box

Copyright © 2016-2017 The Red Mark. All Rights Reserved.

To Top