Hackers Are Using New Tricks to Deliver Ransomware

Hackers Are Using New Tricks to Deliver Ransomware from 365 iT SOLUTIONS

By: 365 iT SOLUTIONS  01-06-2016
Keywords: Computer Software, Computer Repair, Technical Support

Ransomware scams are all about profits and when profits are involved, it creates innovation. Hacker are using new tricks to deliver Ransomware and it is costing businesses tons of money. Over the last several months, the IT industry has been exploding with the constant attack of new Ransomware hitting networks using new tricks, tools, and techniques to snag victims. IT departments, managed IT services providers and IT consultants have been in a constant battle to protect their networks from this cyber risk but they are getting very creative. According to the news and reports, there is no sign of the trend slowing down any time soon. What are some of the new tricks to deliver Ransomware? Locky Ransomware Locky first appeared on Tuesday February 16th, 2016 and it allows the hackers to push the malware aggressively, using massive spam campaigns and compromised websites. Locky encrypts files and adds a “.locky” file extension to them. The cyber criminals then demand a ransom between 0.5 to 1 bitcoin (approximately US$210 to $420). Bucbi Ransomware Not new but the two year old Bucbi ransomware is making a very strong comeback. It now has new targeted attacks and as well as a new brute force technique. According to Palo Alto Networks, they have seen reports of the ransomware infecting Windows Servers and demanding 5 bitcoins (approximately $2,320 US) ransom. Bucbi is no longer randomly seeking victims, it is now targeting attacks. There are no easy shortcuts to get your data back if you don’t have a recent data backup. Locky for example doesn’t just scramble your C: drive, it also scrambles any files in any directory on any mounted drive that it can access, including removable drives, network shares, servers and other user’s computers. If you are logged in as a domain administrator and you get hit by ransomware, you could see widespread damage. What are some protection measures from these new tricks to deliver Ransomware? Backup regularly and keep a data backup copy off-site. Encrypt your data backup. Do not enable macros in document attachments received via email. (Microsoft default is off) Be cautious about unsolicited attachments. Do not give yourself more login and credentials more than needed. Do not stay logged in as an administrator and avoid browsing, opening documents or other “regular work” activities while you have administrator rights. Proactively manage your IT network. Patch early, patch often and stay ahead of malware. Hackers are using new tricks to deliver Ransomware but it does not mean your business needs to fall into the trap. These simple steps will allow you to protect your business from losing money, time and productivity. 365 iT SOLUTIONS is delivers industry leading IT consulting and IT security services including Managed IT Services, IT Support Services, IT Outsourcing Services, Tech Support Services and Cloud Services. Our Complimentary Network Assessment will put your IT infrastructure to the test and test to see if you are using a Layered Security (Layered Defense) approach. We will give you a true picture of your company liabilities from threats such as Ransomware, Malware and other hackers cyber threats.

Keywords: Adware Removal, Business technical support, Computer And Software Stores, Computer Hardware, Computer Maintenance, Computer Networking, Computer Repair, Computer Repair And Maintenance, Computer Security, Computer Software, Computer store, Computer Support, computer technician, Data backup, Data Recovery, Fix Computer, laptop repair, network security, network support, Notebook Repair, onsite computer repair, Pc Maintenance, pc repair, Spyware Removal, Technical Support, Virus Removal, wireless computer

Other news and updates from 365 iT SOLUTIONS

30-09-2016

How Do You Protect Your Business from Hackers Top 5 Attacks?

Recently industry leading security penetration testers put together the most reliable methods for hackers to compromise a network. How do you protect your business from hackers top 5 attacks?


Healthcare takes the top stop for all ransomware from 365 iT SOLUTIONS thumbnail
20-09-2016

Healthcare takes the top stop for all ransomware

Ransomware is attacking and healthcare takes the top stop for all ransomware at a staggering 88 percent. Is your business safe from these security threats?


12-09-2016

Do you use Cisco firewalls? EXTRABACON is a new exploit.

Recently a hacker group hacked successfully into newer Cisco firewalls. Does your company use Cisco firewalls? EXTRABACON is a new exploit and has caused data leaks.


Majority of cloud cyber security risks come from employees from 365 iT SOLUTIONS thumbnail
07-09-2016

Majority of cloud cyber security risks come from employees

Companies are getting smarter and investing in IT to increase their bottom line but the majority of cloud cyber security risks come from employees. How will your business hold up?


That’s not a Microsoft Windows Update, its Actually a Big Security Risk. from 365 iT SOLUTIONS thumbnail
31-08-2016

That’s not a Microsoft Windows Update, its Actually a Big Security Risk.

There is a new ransomware malware out there that’s not a Microsoft Windows Update, its actually a big security risk. Many will be hit by it as it hides itself as a Windows Update. Is your business ready?


Cybercriminals join forces with malware ransomware attacks from 365 iT SOLUTIONS thumbnail
17-08-2016

Cybercriminals join forces with malware ransomware attacks

Kaspersky Lab has seen and incredible increase in cyber-attacks compared to the last quarter as cybercriminals join forces with malware ransomware attacks.


Free Ransomware Decryption Tools from 365 iT SOLUTIONS thumbnail
03-08-2016

Free Ransomware Decryption Tools

Ransomware is increasing but IT security researchers have released two free ransomware decryption tools that can help users recover encrypted files from two new ransomware threats: Bart and PowerWare.


Free Ransomware Decryption Tools from 365 iT SOLUTIONS thumbnail
03-08-2016

Free Ransomware Decryption Tools

Ransomware is increasing but IT security researchers have released two free ransomware decryption tools that can help users recover encrypted files from two new ransomware threats: Bart and PowerWare.


26-07-2016

Law enforcement and IT are Tackling Ransomware

As ransomware becomes a top threat, law enforcement and IT are tackling ransomware and other cyber threats however you can protect your business.


Eleanor malware is a New Apple Mac Risk from 365 iT SOLUTIONS thumbnail
18-07-2016

Eleanor malware is a New Apple Mac Risk

Eleanor malware is a new Apple Mac malware risk and it lets hackers take over your computer.


New Ransomware Ranscam Deletes Files from 365 iT SOLUTIONS thumbnail
12-07-2016

New Ransomware Ranscam Deletes Files

New ransomware Ranscam deletes files even if the victim chooses to pay the ransom. Protect your data and business.


Canadian businesses are behind in technology from 365 iT SOLUTIONS thumbnail
07-07-2016

Canadian businesses are behind in technology

The old standard way was to use a company issued computer and phone. At the end of the day, you left your work behind and went home. Things have changed drastically and Canadian businesses are behind in technology.


Why are hackers targeting healthcare? from 365 iT SOLUTIONS thumbnail
29-06-2016

Why are hackers targeting healthcare?

Why are hackers targeting healthcare is a good question and the fact that the dark web is selling 655,000 medical records is a clear indication of why they are doing it, extremely profitable.


Is Cloud Services Right for your Business? from 365 iT SOLUTIONS thumbnail
09-06-2016

Is Cloud Services Right for your Business?

Cloud services is becoming increasingly popular for businesses with a jump of 70% according to IDC in the next 12 months. Is cloud services right for your business? Here are some important factors to consider.


Why your endpoint security is your weakest link from 365 iT SOLUTIONS thumbnail
06-06-2016

Why your endpoint security is your weakest link

You have endpoint security on your computer systems but is it putting your company at risk? Find out why your endpoint security is your weakest link in protecting your business.