How To Protect Yourself Against Ransomware

Ransomware is gaining at a fast pace over the past few years.  Studies have shown that ransomware makes up around 40% of the spam emails in the year 2016 and now is a $1 Billion industry.  Below are some of the the things consumers and businesses can take to help protect against ransomware.

  1. Majority of ransomware is delivered via email where hackers attack malware to the email as attachment.  Once the end user open the attachment, the virus will take over the computer and allow the attacker is use the computer.  In most cases emails are subjected as invoices, tracking ID or request for money.   In other cases, they are simply addressed to a name as a subject in hopes that end user will open them since it’s addressed to a specific name.
  2. Businesses should utilize ddos protection services to stop attackers from using DDoS attacks to request ransom.
  3. Always create backup of all devices independent of the operation system.  Some users believe Apple devices are immune to any hacks but KeRanger malware is specifically targeting Max OS X operating system.
  4. Make sure all devices such as smartphones, desktops are set to receive automatic updates on regular basis.
  5. Disable document macros in emails and programs like word, excel etc.  According to recent reports, document macros are becoming common method of infecting users.

Some people strongly believe that they will never be hacked but studies have shown that everyone is at risk including both consumers and businesses.  Therefore, it is crucial to take necessary steps to mitigate these attacks.


Dridex malware snitches money from UK banks

The National Crime Agency has disclosed that the Dridex malware has swiped up from UK bank accounts to GBP20m, while global losses may have already hit $100m.

One of many alleged hackers on the other side of the assault, Andrey Ghinkul, has been detained, along with a sizable ball of the botnet has been now been taken down.

“Our investigation is ongoing and we anticipate additional arrests to made.”  The Dridex malware is set on a computer by means of a macro. It is generally a Microsoft Office one.

The NCA in the UK is, in addition, working with the FBI in America. Its Executive Assistant Director Robert Anderson said: “We encourage all web users to take action and upgrade your operating system.  The malware is also called Cridex and Bugat.