This Ransomware report covers the entire details of the kind/ type of attacks happened in the entire month of October 2017. It not only gives the details of the number of ransomware threats but also informs us of phishing attacks, malware URLs and other dangerous executables. Each and every day their threat parameters varied and eScan has successfully tracked it with the help of server hits.
The growth of targeted attacks
In October 2017, eScan’s researchers have found out an emerging and alarming trend. Most cyber criminals are turning their attention towards attacks against private users to targeted businesses. These attacks are majorly focused on BFSI sector.
As we can see in the above image, there is a steep rise in the number of attacks towards end of the month presumably being the holiday season and online activities are comparatively higher. This trend shows more potential ransomware targets with attacks resulting for disastrous consequences.
Now, the analysis of the below report attempts to assess the scale of the problem and highlights the periods when the ransomware invasions were maximum mostly due to the peak festival shopping.
Ransomware are invading networks every now and then. Ransomware hourly statistics gives a clear picture of how frequent it is searching for vulnerable areas where it can enter for its encryption activities. In the last half of the month of October 2017, the ransomware attacks reached its peak during Diwali festival and have fluctuated a lot thereafter. This proves that any important occasion or festival accelerates the possibilities and forces the organizations to take extra preventive measures to avoid any loss.
Ransomware not only targets individuals, but businesses and government are also be victims to it. Around 150 Computers of Mantralaya, headquarters of Maharashtra Government were attacked by Locky Ransomware. Paying the ransom amount doesn’t guarantee that encrypted files would be released.
• Update your antivirus software on regular basis, which will protect your system from all kinds of Malware attacks.
• Always download apps from their official website or Google Play Store instead of unknown sources because many apps store are still offering the app.
• Download applications of a reliable app developer. In addition, check the user ratings and reviews of the app before download.
• Ensure that all the software installed in your system is updated frequently, including Oracle Java and Adobe.
• Implement a three dimensional security policy in your organization, i.e. firstly understand your requirement based on which IT Security policy would be prepared accordingly. Secondly, educate your staff about the policy and finally enforce the policy.
• Make sure you either implement MailScan at gateway level or enable Mail Anti-virus on endpoint in order to block extensions such as *.EXE, *.SCR, *.JS, *.VBE etc. These attachments would infect your system.
• Open emails only if you are positive about the source.
• Regularly create backup of your important files.