Refers to extortionate malware. Cybercriminals use ransomware to make files, hard drives, computers or entire networks inaccessible to their legitimate users and demand a ransom to release the files, etc. The term is made up of the English words “ransom” for ransom and “-ware” as a word part of software, i.e. program.
Ransomware attacks are currently on the rise. Cybercriminals have identified companies, authorities and administrations as worthwhile targets for themselves. Increasingly, complex, individualized attacks on companies are being observed. Cybercriminals take a targeted and often multi-stage approach. With seemingly everyday cyber incidents such as spam , they gain access to the corporate network. Then they research the IT infrastructure in order to encrypt particularly important or sensitive data in a targeted manner – or the entire system, including connected backups. This approach allows the extortionists to exert greater pressure on the affected companies and demand higher ransoms. Paying the ransom is the desired endpoint of the cybercriminals’ activities.
Whether they release the encrypted data or systems afterwards is therefore always uncertain. Some ransomware programs don’t have any intended decryption, which means that the data remains encrypted even after a ransom payment is made.
In the case of the well-known WannaCry ransomware, ransom payments could not be assigned due to a programming error. As a result, no corresponding decryption of the data took place.
A second, higher ransom demand can also be part of the cybercriminals’ concept.
Technically, ransomware is a Trojan. Ransomware can be transmitted in several ways, including via infected email attachments, compromised websites, infected USB sticks and hard drives, network security vulnerabilities, and drive-by downloads.
Potentially, you will encounter it with every email with an attachment, with every email with a link and in many other places in your everyday work. For example, in the case of seemingly lost or forgotten USB sticks, when transferring data to customers’ external hard drives, when downloading a supposedly important update to be able to watch a video on the Internet. In all these places, you can keep great damage away from your company with your prudence.
Within the framework of this glossary, we can only provide suggestions and insights. Please discuss and create a comprehensive procedure with your IT department or with an external IT security service provider such as Perseus.
Preventive
Nearly all measures to reduce your organization’s cyber risk also reduce the risk of ransomware attacks. These measures include, but are not limited to:
After a seemingly “normal” cyber incident
In acute cases
ATTENTION: These instructions are general. In acute cases, stick to the procedure discussed with your IT department or with an external IT security service provider such as Perseus. Only this is tailored to your company-specific IT infrastructure!
Further information and tips for acute cases from the Police Crime Prevention:https://www.polizei-beratung.de/themen-und-tipps/gefahren-im-internet/ransomware/