What do you need to know?
1. In a typical attack, a user receives a phishing email that looks legitimate. It could appear to be from a company email address, or from someone they know.
2. Suitably promoted, the user clicks a link or downloads an attachment in the email, giving ransomware access to his or her computer and the broader company network.
3. The ransomware encrypts files and data, locking users out of their network and bringing the target business to a grinding halt. If it's an e-commerce business, all trading ceases.
4. The company receives a message demanding a ransom to get back file access or risk losing their data forever. Attackers usually request payment in untraceable bitcoins.
5. Australian businesses pay an average ransom of $15,747 to get back their data, but individual ransoms can be much higher.
6. Even after paying the ransom, around half of the businesses targeted by ransomware experience significant downtime and data loss as a result.
> More
Ransomware has quickly become the most lucrative type of malware ever seen.
The FBI has said it is on way to becoming a $1 billion annual market. Cisco Talos research shows that a single ransomware campaign can generate up to $60 million annually. Ransomware is gaining so much attention it is has been featured on broadcast TV shows.
Attackers have the funds and desire to continue innovating ransomware strands that will become far more virulent. We believe that ransomware will become more capable of self-propagating, with the aim of locking up vast swaths of corporate networks. That would effectively knock corporate IT functionality back to the 1970s.
Current responses to ransomware tend to revolve around single point products. We must consider bringing a more architectural approach to bear given the various vectors it targets to gain infections. This solution overview addresses the various vectors and methods that attackers use. Defenders must secure both email and the web, block access to malicious infrastructure on the Internet, stop any ransomware files that make it all the way to an endpoint, block the commandand-control callbacks used and prevent easily lateral movement of ransomware should an infection occur.
Read the Cyber Threat Response magazine to see how the cyber criminals are exploiting the breaches
Cisco Ransomware Defense brings together all the necessary pieces of the Cisco security architecture to address the ransomware challenge. You can choose all the pieces or select ones that fulfill an immediate security need.
Advanced Malware Protection can be immediately added to email security products through an easy license for static and dynamic analysis (sandboxing) of unknown attachments that traverse the Cisco Email Security gateway.
With Ransomware Defense, you can use your network as an enforcer to contain the spread of ransomware. It will not be able to propagate as easily on the network in the worst-case scenario of an infection. Cisco Security Services can provide immediate triage in the case of an outbreak. They also streamline deployments and help ensure that the solution is configured to provide the greatest possible effectiveness in your environment.