Ransomware arrests highlight online blackmail threat
Posted on 14.12.2012
Detectives from the Police Central e-Crime Unit (PCeU) arrested three people in connection with using ransomware to blackmail people.

It has been alleged that computer users were targeted and led to believe that they were required to pay a fine as part of an ongoing police inquiry – with the hackers using a popup page containing the Metropolitan Police logo to force users to pay up to £100 to retrieve the data on their computer.

It has also emerged that cybercriminals in the US are also adopting this tactic, using the FBI’s logo to trick and then defraud users.

Paul Davis, Director of Europe at FireEye has made the following comments:

With more people waking up to the realities of spear phishing and other methods of attack on their data – ransomware is looking like the next logical step in social engineering. And that is a very frightening prospect indeed. While this type of scam has been around for quite some time, recent incidents on both sides of the Atlantic suggest that hackers are increasingly making it part of their ongoing quest to capture valuable data.

Worryingly, the panic created in people who happen to visit the wrong website at the wrong time could make them succumb to the financial demands of cybercriminals simply to avoid embarrassment.

Though it is arguably a scam targeted at consumers, ransomware can easily find its way onto the corporate network – paving the way for larger-scale attacks against organisations. With employees increasingly browsing social networking websites and opening email attachments from strangers, they are fast becoming a real threat to IT security – after all, it takes just one person to click the wrong link for malware to infect the entire system. The information that is harvested and held to ransom can then be sold on to other hackers who really know how to use it.

As with all sophisticated, elaborate IT security threats, the only way to ensure the most robust protection for the corporate network – without imposing a blanket ban on personal internet use – is for organsiations to have a comprehensive security solution in place across the entire IT estate.

It’s been said time and time again that traditional perimeter solutions are not strong enough to fight the calibre of threats that we are seeing today, and advanced security tools must be used to protect all potential vectors of attack. Only then can IT teams be sure that all bases are covered, even in the event that one employee slips up.





Spotlight

Whitepaper: Zero Trust approach to network security

Posted on 20 November 2014.  |  Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Nov 21st
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //