SlideShare a Scribd company logo
THE RISING THREAT OF
RANSOMWARE
Ransomware by the Numbers
»
The portion of malicious
email attachments that
contain ransomware
Source:
IBM X-Force Threat Intelligence
Index 2017
The estimated total of
ransomware payments
made in 2016
Source:
http://www.csoonline.com/article/315471
4/security/ransomware-took-in-1-billion-in
-2016-improved-defenses-may-not-be-en
ough-to-stem-the-tide.html
85%
The average ransom
demand in 2016
(up from $294 in 2015)
Source:
Symantec's 2017 Internet Security
Threat Report
$1
BILLION
Ransomware Q&A
What Is Ransomware?
Ransomware is a type of malicious software —
i.e., malware — that blocks access to a device
or data until a ransom is paid.
How Much Are Ransoms?
Some ransom demands are relatively low, in the range
of a few hundred dollars. However, cybercriminals
are getting more aggressive. Attacks that target
healthcare institutions and larger organizations
can carry very high ransom demands. For
example, a South Korean web hosting firm
admitted to paying a $1M ransom to its
attackers in June 2017.
What Does Ransomware Do?
When a device is infected with ransomware, some type of encryption is applied,
effectively locking you out of your files or your device. If you are infected, you will receive
a ransom message from the attacker asking for payment which, allegedly, will grant you
access to the digital key needed to unlock your files and/or system.
How Are Ransoms Collected?
Attackers generally require ransoms to be paid in
Bitcoin or another “untraceable” electronic format.
These “cryptocurrencies” are fully digital. They are
created and held electronically, have no physical form,
and are not controlled by any banking entity.
FACT:
There are several well-known ransomware variants
(including Locky, Cerber, and SLocker). These variants
are continuously modified to bypass antivirus
software, demand different ransom amounts, take
advantage of different infrastructure vulnerabilities, etc.
~600%
INCREASE
in the volume of
mobile ransomware
in Q1 2017
in newly created
cryptor ransomware
modifications between
Q2 2016 and Q1 2017
3.5x
INCREASE
Source:
Kaspersky Lab Malware Report for Q1, 2017
new cryptor ransomware
modifications identified in Q1 201755,000+
Source:
2017 Healthcare Cybersecurity Report, Cybersecurity Ventures
THE RATE OF RANSOMWARE ATTACKS ON HEALTHCARE
ORGANIZATIONS IS EXPECTED TO QUADRUPLE BY 2020.
HEALTHCARE
ORGANIZATIONS
Ransomware Prevention and Protection
To Pay or Not to Pay?
Security experts generally advise against paying a
ransom. Paying only encourages these types
of attacks.
However, if an organization has not backed up files to
a secure location, paying the ransom might be regarded
as the only option for recovering data. Though some
services claim they can recover files without the
decryption key, it can be next to impossible to reverse
an infection.
Will Paying a Ransom Restore My Files?
Sometimes. But there have been known instances in
which the attackers never delivered the decryption key
following payment, as well as ransomware with critical
programming flaws that rendered data unrecoverable,
even with the key. In other cases, an organization has
paid the ransom only to be hit with a second, larger
payment request.
DON’T COUNT ON ‘HONOR
AMONG THIEVES.’ »
Bottom Line:
DON'T BECOME A RANSOMWARE VICTIM!
Know how to prevent an infection and be prepared to recover your data if you do get hit.
unknown links, ads,
and websites
AVOID
download unverified
attachments or apps
DON’T
software up to date
and patch known
vulnerabilities
KEEP
data and files to a
secure location daily
or even hourly
(if possible)
BACK UP
3030 Penn Ave Pittsburgh, PA 15201
www.wombatsecurity.com
+1 412.621.1484 | +44 (20) 3807 3472
© 2008-2016 Wombat Security Technologies, Inc. All rights reserved.
We deliver security awareness and training about a range of cybersecurity
threats, including ransomware. Our assessment and education tools change
behaviors and reduce risk in the workplace and beyond.
$1,077
https://www.ibm.com/security/data-breach/threat-intelligence-index.html
https://www.ibm.com/security/data-breach/threat-intelligence-index.html
https://www.symantec.com/security-center/threat-report)
https://www.symantec.com/security-center/threat-report)
https://securelist.com/it-threat-evolution-q1-2017-statistics/78475/)
http://cybersecurityventures.com/healthcare-cybersecurity-report-2017/

More Related Content

What's hot

Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 bcilondonforum
 
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskLynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskRaveem Ismail
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...Eyal Doron
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018malvvv
 
Piracy in the Appstore
Piracy in the AppstorePiracy in the Appstore
Piracy in the AppstorePinch Media
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network securityGreat Bay Software
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersmalvvv
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisFraudBusters
 
BSides SF Security Mendoza Line
BSides SF Security Mendoza LineBSides SF Security Mendoza Line
BSides SF Security Mendoza LineEd Bellis
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani Tanish Khilani
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicCisco Security
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Symantec
 

What's hot (20)

Mimecast BCI Event October 2017
Mimecast BCI Event October 2017 Mimecast BCI Event October 2017
Mimecast BCI Event October 2017
 
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting CyberriskLynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
Lynch2015 - History Likely Not Enough to Price Ever-Shifting Cyberrisk
 
Canadian Cybercrime Report Card
Canadian Cybercrime Report CardCanadian Cybercrime Report Card
Canadian Cybercrime Report Card
 
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...Dealing with the threat of spoof and phishing mail attacks   part 6#9 | Eyal ...
Dealing with the threat of spoof and phishing mail attacks part 6#9 | Eyal ...
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
Eset trends report_2018
Eset trends report_2018Eset trends report_2018
Eset trends report_2018
 
Special report on security
Special report on securitySpecial report on security
Special report on security
 
Piracy in the Appstore
Piracy in the AppstorePiracy in the Appstore
Piracy in the Appstore
 
Infographic: The crippled state of network security
Infographic: The crippled state of network securityInfographic: The crippled state of network security
Infographic: The crippled state of network security
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing EmailsAnalyzing Social and Stylometric Features to Identify Spear phishing Emails
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
 
Ksn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominersKsn report ransomware-and-malicious-cryptominers
Ksn report ransomware-and-malicious-cryptominers
 
Detecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data AnalysisDetecting Healthcare Vendor Fraud Using Data Analysis
Detecting Healthcare Vendor Fraud Using Data Analysis
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
 
BSides SF Security Mendoza Line
BSides SF Security Mendoza LineBSides SF Security Mendoza Line
BSides SF Security Mendoza Line
 
Remote workforce security challenges
Remote workforce security challengesRemote workforce security challenges
Remote workforce security challenges
 
Phishing technique tanish khilani
Phishing technique tanish  khilani Phishing technique tanish  khilani
Phishing technique tanish khilani
 
The Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware InfographicThe Cost of Inactivity: Malware Infographic
The Cost of Inactivity: Malware Infographic
 
Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks Comprehensive Protection and Visibility into Advanced Email Attacks
Comprehensive Protection and Visibility into Advanced Email Attacks
 
B intelligence report-08-2013.en-us
B intelligence report-08-2013.en-usB intelligence report-08-2013.en-us
B intelligence report-08-2013.en-us
 

Similar to Wombat security infographic_ransomware_june2017

The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsProtected Harbor
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017Dryden Geary
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up bookDiego Souza
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?Datto
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWareUmer Saeed
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Roger Hagedorn
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecSoluciona Facil
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingCigniti Technologies Ltd
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceSparkCognition
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessIndusfacePvtLtd
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideSarah Roberts
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?MaryJWilliams2
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Security
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdfJenna Murray
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxInfosectrain3
 

Similar to Wombat security infographic_ransomware_june2017 (20)

The Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBsThe Complete Guide to Ransomware Protection for SMBs
The Complete Guide to Ransomware Protection for SMBs
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
Ransomware Review 2017
Ransomware Review 2017Ransomware Review 2017
Ransomware Review 2017
 
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About RansomwareWhat Businesses Entrepreneurs Are Imperative To Know About Ransomware
What Businesses Entrepreneurs Are Imperative To Know About Ransomware
 
Ransomware all locked up book
Ransomware all locked up bookRansomware all locked up book
Ransomware all locked up book
 
What is Ransomware?
What is Ransomware?What is Ransomware?
What is Ransomware?
 
Combating RANSOMWare
Combating RANSOMWareCombating RANSOMWare
Combating RANSOMWare
 
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
Your Money or Your Data: Ransomware, Cyber Security and Today’s Threat Landsc...
 
Istr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantecIstr number 23 internet security threat repor 2018 symantec
Istr number 23 internet security threat repor 2018 symantec
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Tackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testingTackling the maze ransomware attack with security testing
Tackling the maze ransomware attack with security testing
 
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack SurfaceHow to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
 
True Cost of Ransomware to Your Business
True Cost of Ransomware to Your BusinessTrue Cost of Ransomware to Your Business
True Cost of Ransomware to Your Business
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
What is ransomware?
What is ransomware?What is ransomware?
What is ransomware?
 
What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?What Ransomware Taught us in 2021?
What Ransomware Taught us in 2021?
 
Panda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion GuidePanda Adaptive Defense 360 - Cyber Extortion Guide
Panda Adaptive Defense 360 - Cyber Extortion Guide
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Defending Against Ransomware.pdf
Defending Against Ransomware.pdfDefending Against Ransomware.pdf
Defending Against Ransomware.pdf
 
Ransomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptxRansomware- A reality check (Part 1).pptx
Ransomware- A reality check (Part 1).pptx
 

Recently uploaded

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxAbida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Thierry Lestable
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...CzechDreamin
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutesconfluent
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backElena Simperl
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupCatarinaPereira64715
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...CzechDreamin
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeCzechDreamin
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...CzechDreamin
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...Sri Ambati
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...Product School
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaRTTS
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIES VE
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Product School
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2DianaGray10
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsExpeed Software
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsPaul Groth
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...Product School
 

Recently uploaded (20)

IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Wombat security infographic_ransomware_june2017

  • 1. THE RISING THREAT OF RANSOMWARE Ransomware by the Numbers » The portion of malicious email attachments that contain ransomware Source: IBM X-Force Threat Intelligence Index 2017 The estimated total of ransomware payments made in 2016 Source: http://www.csoonline.com/article/315471 4/security/ransomware-took-in-1-billion-in -2016-improved-defenses-may-not-be-en ough-to-stem-the-tide.html 85% The average ransom demand in 2016 (up from $294 in 2015) Source: Symantec's 2017 Internet Security Threat Report $1 BILLION Ransomware Q&A What Is Ransomware? Ransomware is a type of malicious software — i.e., malware — that blocks access to a device or data until a ransom is paid. How Much Are Ransoms? Some ransom demands are relatively low, in the range of a few hundred dollars. However, cybercriminals are getting more aggressive. Attacks that target healthcare institutions and larger organizations can carry very high ransom demands. For example, a South Korean web hosting firm admitted to paying a $1M ransom to its attackers in June 2017. What Does Ransomware Do? When a device is infected with ransomware, some type of encryption is applied, effectively locking you out of your files or your device. If you are infected, you will receive a ransom message from the attacker asking for payment which, allegedly, will grant you access to the digital key needed to unlock your files and/or system. How Are Ransoms Collected? Attackers generally require ransoms to be paid in Bitcoin or another “untraceable” electronic format. These “cryptocurrencies” are fully digital. They are created and held electronically, have no physical form, and are not controlled by any banking entity. FACT: There are several well-known ransomware variants (including Locky, Cerber, and SLocker). These variants are continuously modified to bypass antivirus software, demand different ransom amounts, take advantage of different infrastructure vulnerabilities, etc. ~600% INCREASE in the volume of mobile ransomware in Q1 2017 in newly created cryptor ransomware modifications between Q2 2016 and Q1 2017 3.5x INCREASE Source: Kaspersky Lab Malware Report for Q1, 2017 new cryptor ransomware modifications identified in Q1 201755,000+ Source: 2017 Healthcare Cybersecurity Report, Cybersecurity Ventures THE RATE OF RANSOMWARE ATTACKS ON HEALTHCARE ORGANIZATIONS IS EXPECTED TO QUADRUPLE BY 2020. HEALTHCARE ORGANIZATIONS Ransomware Prevention and Protection To Pay or Not to Pay? Security experts generally advise against paying a ransom. Paying only encourages these types of attacks. However, if an organization has not backed up files to a secure location, paying the ransom might be regarded as the only option for recovering data. Though some services claim they can recover files without the decryption key, it can be next to impossible to reverse an infection. Will Paying a Ransom Restore My Files? Sometimes. But there have been known instances in which the attackers never delivered the decryption key following payment, as well as ransomware with critical programming flaws that rendered data unrecoverable, even with the key. In other cases, an organization has paid the ransom only to be hit with a second, larger payment request. DON’T COUNT ON ‘HONOR AMONG THIEVES.’ » Bottom Line: DON'T BECOME A RANSOMWARE VICTIM! Know how to prevent an infection and be prepared to recover your data if you do get hit. unknown links, ads, and websites AVOID download unverified attachments or apps DON’T software up to date and patch known vulnerabilities KEEP data and files to a secure location daily or even hourly (if possible) BACK UP 3030 Penn Ave Pittsburgh, PA 15201 www.wombatsecurity.com +1 412.621.1484 | +44 (20) 3807 3472 © 2008-2016 Wombat Security Technologies, Inc. All rights reserved. We deliver security awareness and training about a range of cybersecurity threats, including ransomware. Our assessment and education tools change behaviors and reduce risk in the workplace and beyond. $1,077 https://www.ibm.com/security/data-breach/threat-intelligence-index.html https://www.ibm.com/security/data-breach/threat-intelligence-index.html https://www.symantec.com/security-center/threat-report) https://www.symantec.com/security-center/threat-report) https://securelist.com/it-threat-evolution-q1-2017-statistics/78475/) http://cybersecurityventures.com/healthcare-cybersecurity-report-2017/