SlideShare a Scribd company logo
1 of 2
No More Ransom- Six Years of Innovating
to Fight Ransomware Together
In discussions about cybercrime it's impossible to ignore the issue of ransomware. It's
one of the very few cybersecurity threats that are discussed not just in the tech and
cybersecurity communities however, it also appears in news headlines in mainstream
media Board meetings, headlines, and even in emergency assistance calls from
relatives friends, neighbors, and family members.
What should you do if your PC is infected by r ansomware and you've lost access to all
of your data, and you aren't able to recover your backup data? One of the last
remaining options is to head over to https://www.nomoreransom.org for helpful advice
and tools to recover your files without paying the r ansom. Upload a few examples of
files encrypted and submit information from the ransom request. Crypto Sheriff
identifies the ransomware family and gives you a link to a decryption software in the
event that one is it is available. There are tools for decryption for 165 distinct
ransomware families are accessible and cover a vast array of potential malicious
actors.
This No More Ransom initiative is one of the most effective examples of how the
private and public sectors can work to benefit everyone , from individuals to big
corporations. Together 188 partners, which includes 49 police forces across the globe
and several security vendors for endpoints have joined forces in this concerted
initiative to help victims of ransomware attacks recover their data tha t was encrypted,
without having to pay criminals. Bitdefender is pleased to be a in this ongoing
initiative.
Retrieving information and disrupting the
cybercrime system
Ransomware isn't a new threat . In fact it's been around for more than 30 years. When
we mark the sixth anniversary of No More Ransom project, it's a great time to assess
whether the threat is still in place. It was launched in the year prior to WannaCry (still
the top of in our rankings) in addition to the IT environment has drastically cha nged
since then.
The No More Ransom initiative is more relevant as it did in the year 2016. The original
aim of the initiative was to restore access to encrypted data however, it now serves a
much more crucial objective - disrupting the cybercrime system.
Modern ransomware is a lot different than in the year 2016. The biggest change came
with the introduction of the profit-sharing business model, referred to as Ransomware-
as-a-Service (RaaS) in 2018. The "business model" is often described as a simple rent
of infrastructure for ransomware, but this isn't the most accurate description.
The largest taxi company in the world does not have any vehicles (Uber). The world's
biggest accommodation provider does not have any properties (AirBnB). The largest
ransomware organizations aren't actually using the ransomware they have
developed. Instead, they partner in conjunction with contractors independent of them
(affiliates) and split the profits once the ransom is paid. A lot of people overlook
however, a significant aspect is the ratio of revenue sharing between the ransomware
organization and affiliates. Even though the RaaS group is the one that receives the
highest media focus, the independent affiliates keep the bulk of the earnings (75-90
percent). Over the last couple of years the power has changed from the people who
control the ransomware's code to those who have control over network access and
make use of the networks.
DIGITAL DEVICES LTD
Long before Apple setanaverage consumersmindsettoreplacingtheirhandheldgadgetsintwoyears,
Digital DevicesLtd believedinMoore'slaw thatcomputingwill doubleeverytwoyears.Withour
heritage fromthe daysof IBMPersonal ComputerXT,ourfoundershave gone throughthe technology
advancementsof the 1990s and 2000s realizingthattechnologyisaninstrumental partof anybusiness's
success.Withsuch a fast pace industry,anIT departmentcanneverbe equippedwiththe toolsand
trainingneededtomaintaintheircompetitiveedge.Hence, Digital Deviceshasputtogethera teamof
engineersandvendorpartnerstokeepupwiththe latestindustrytrendsandrecommendclientson
varioussolutionsandoptionsavailabletothem.From formingclose relationshipswithnetworkingand
storage vendorslike Juniper,SolarWindsandVMWare tohigh-performancecomputingbyHPEor AWS
Cloudsolutions, Digital DevicesLimitedoffersthe latest technologysolutionstofitthe ever-growing
needsof the industry.
Our expertscanguide youthroughthe specificationsandbuildcostefficiencieswhile providinghigh
end,state-of-the-artcustomerservices.We researchandanalysesmarketanditscurrentdemandand
supplychainbyofferingwide range of bulksupplies of productslike AKG C414 XLII, ShireenCablesDC-
1021, ShireenCablesDC-2021, Dell p2419h monitor,Dell U2419H, Dell P2719H, Dell P2219H, Lenovo
62A9GAT1UK, LG 65UH5F-H andComplete ITInfrastructure products and services.

More Related Content

More from Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices

More from Digital Devices LTD: Top B2B IT Reseller in UK | Digital Devices (15)

Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?Forecasting Metaverse Threats: Will it Become Metaworse?
Forecasting Metaverse Threats: Will it Become Metaworse?
 
XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.XDR - The latest TLA or the Newest Cyber Shield.
XDR - The latest TLA or the Newest Cyber Shield.
 
How Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business GrowthHow Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business Growth
 
The Way Quantum Computing Will Change Encryption Forever
The Way Quantum Computing Will Change Encryption ForeverThe Way Quantum Computing Will Change Encryption Forever
The Way Quantum Computing Will Change Encryption Forever
 
A digital attack surface map is in order.
A digital attack surface map is in order.A digital attack surface map is in order.
A digital attack surface map is in order.
 
The thirst of a worker can cause toxic resumes
The thirst of a worker can cause toxic resumesThe thirst of a worker can cause toxic resumes
The thirst of a worker can cause toxic resumes
 
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks3 Reasons Manufacturers Are a Prime Target for Cyberattacks
3 Reasons Manufacturers Are a Prime Target for Cyberattacks
 
Safeguarding Against the Five Stages Of a Ransomware Attack
Safeguarding Against the Five Stages Of a Ransomware AttackSafeguarding Against the Five Stages Of a Ransomware Attack
Safeguarding Against the Five Stages Of a Ransomware Attack
 
2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways2022 Cymulate Breaches Survey - Five Key Takeaways
2022 Cymulate Breaches Survey - Five Key Takeaways
 
Part 1: Data Distribution Service
Part 1: Data Distribution ServicePart 1: Data Distribution Service
Part 1: Data Distribution Service
 
How Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business GrowthHow Cyber Resilience Enables Business Growth
How Cyber Resilience Enables Business Growth
 
Manual user provisioning is dangerous
Manual user provisioning is dangerousManual user provisioning is dangerous
Manual user provisioning is dangerous
 
Worker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumesWorker's thirst can lead to poisoned resumes
Worker's thirst can lead to poisoned resumes
 
What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?What's the cause behind the rise in RANSOMWARE attacks?
What's the cause behind the rise in RANSOMWARE attacks?
 
Danger Debrief | June 2022
Danger Debrief | June 2022Danger Debrief | June 2022
Danger Debrief | June 2022
 

No More Ransom - Six Years of Innovating to Fight Ransomware Together

  • 1. No More Ransom- Six Years of Innovating to Fight Ransomware Together In discussions about cybercrime it's impossible to ignore the issue of ransomware. It's one of the very few cybersecurity threats that are discussed not just in the tech and cybersecurity communities however, it also appears in news headlines in mainstream media Board meetings, headlines, and even in emergency assistance calls from relatives friends, neighbors, and family members. What should you do if your PC is infected by r ansomware and you've lost access to all of your data, and you aren't able to recover your backup data? One of the last remaining options is to head over to https://www.nomoreransom.org for helpful advice and tools to recover your files without paying the r ansom. Upload a few examples of files encrypted and submit information from the ransom request. Crypto Sheriff identifies the ransomware family and gives you a link to a decryption software in the event that one is it is available. There are tools for decryption for 165 distinct ransomware families are accessible and cover a vast array of potential malicious actors. This No More Ransom initiative is one of the most effective examples of how the private and public sectors can work to benefit everyone , from individuals to big corporations. Together 188 partners, which includes 49 police forces across the globe and several security vendors for endpoints have joined forces in this concerted initiative to help victims of ransomware attacks recover their data tha t was encrypted, without having to pay criminals. Bitdefender is pleased to be a in this ongoing initiative. Retrieving information and disrupting the cybercrime system Ransomware isn't a new threat . In fact it's been around for more than 30 years. When we mark the sixth anniversary of No More Ransom project, it's a great time to assess whether the threat is still in place. It was launched in the year prior to WannaCry (still the top of in our rankings) in addition to the IT environment has drastically cha nged since then. The No More Ransom initiative is more relevant as it did in the year 2016. The original aim of the initiative was to restore access to encrypted data however, it now serves a much more crucial objective - disrupting the cybercrime system. Modern ransomware is a lot different than in the year 2016. The biggest change came with the introduction of the profit-sharing business model, referred to as Ransomware- as-a-Service (RaaS) in 2018. The "business model" is often described as a simple rent of infrastructure for ransomware, but this isn't the most accurate description. The largest taxi company in the world does not have any vehicles (Uber). The world's biggest accommodation provider does not have any properties (AirBnB). The largest ransomware organizations aren't actually using the ransomware they have
  • 2. developed. Instead, they partner in conjunction with contractors independent of them (affiliates) and split the profits once the ransom is paid. A lot of people overlook however, a significant aspect is the ratio of revenue sharing between the ransomware organization and affiliates. Even though the RaaS group is the one that receives the highest media focus, the independent affiliates keep the bulk of the earnings (75-90 percent). Over the last couple of years the power has changed from the people who control the ransomware's code to those who have control over network access and make use of the networks. DIGITAL DEVICES LTD Long before Apple setanaverage consumersmindsettoreplacingtheirhandheldgadgetsintwoyears, Digital DevicesLtd believedinMoore'slaw thatcomputingwill doubleeverytwoyears.Withour heritage fromthe daysof IBMPersonal ComputerXT,ourfoundershave gone throughthe technology advancementsof the 1990s and 2000s realizingthattechnologyisaninstrumental partof anybusiness's success.Withsuch a fast pace industry,anIT departmentcanneverbe equippedwiththe toolsand trainingneededtomaintaintheircompetitiveedge.Hence, Digital Deviceshasputtogethera teamof engineersandvendorpartnerstokeepupwiththe latestindustrytrendsandrecommendclientson varioussolutionsandoptionsavailabletothem.From formingclose relationshipswithnetworkingand storage vendorslike Juniper,SolarWindsandVMWare tohigh-performancecomputingbyHPEor AWS Cloudsolutions, Digital DevicesLimitedoffersthe latest technologysolutionstofitthe ever-growing needsof the industry. Our expertscanguide youthroughthe specificationsandbuildcostefficiencieswhile providinghigh end,state-of-the-artcustomerservices.We researchandanalysesmarketanditscurrentdemandand supplychainbyofferingwide range of bulksupplies of productslike AKG C414 XLII, ShireenCablesDC- 1021, ShireenCablesDC-2021, Dell p2419h monitor,Dell U2419H, Dell P2719H, Dell P2219H, Lenovo 62A9GAT1UK, LG 65UH5F-H andComplete ITInfrastructure products and services.