The Things to Know About Ransomware and Phishing
Cybercriminals are no longer solely attacking big corporations but are increasingly turning their attention to small firms. Nearly half of the global attacks logged during the course of 2015 were against small companies with fewer than 100 staff, as criminals sought to exploit their digital weaknesses to steal information, bring down websites and send spam. The issue of cyber security for small businesses is made even more pressing by new European Regulations aimed at protecting customer data even after Brexit. The EU’s new General Data Protection Regulation will come into force in 2018 and could result in companies being fined up to €20m or 4% of their annual turnover, whichever is greater, for allowing any security breaches to compromise their customer data.
We highlight two of the biggest ways hackers steal or take control of your data, Ransomware and Phishi
How ransomware works
Criminals can deliver ransomware in different ways. Usually, it’s via links in malicious emails that trigger the automatic download of malware. This malware then takes advantage of vulnerabilities hidden in your software.
Kaspersky’s recent security bulletin states that vulnerabilities in internet browsers are the cause of 62 percent of malware infections, which include ransomware. The other 38 percent of viruses exploit common software, such as Adobe Flash Player and Java.
Once you download ransomware, depending on what type of ransomware it is, it can either lock your computer screen or encrypt your files using cryptographic keys. The criminal behind the attack will then demand payment before they either unlock your screen or give you the private cryptographic key so that you can un-encrypt your files. Of course, paying this ransom is not a guarantee. Some criminals will take your money and leave you with nothing.
Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, social security numbers, passwords, and more. That’s why phishing emails are considered a main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorised in two different ways:
General phishing is sent in a blast for multiple people and acts like a boilerplate trying to attract someone to click and enter pertinent information.
Spear phishing is more direct, and a specific person (or specific group, such as executive, HR, or finance staff) is identified and targeted. The person of interest is sent an email from someone they trust asking for sensitive information. The majority of the time, the email comes from high-profile individuals, such as the CEO emailing someone in the finance department for account information.
Phishing isn’t necessarily as profitable as ransomware, but the value isn’t in the money—it’s in the information. The National Insurance numbers, passwords, and any other information acquired in a phishing attack could be sold to someone else. Phishing attacks can cause more wide-ranging damage than ransomware because your information can be used to give someone a new identity or open up lines of credit in your name.
When it comes to ransomware and phishing, the user is both the strongest defence and the weakest link. Hardware and software can only go so far to protect your systems, but if the user is knowledgeable, ransomware and phishing can be more preventable.
- Be very careful about opening unsolicited attachments – most Windows ransomware has been embedded in documents distributed as email attachments
- Emails asking for personal information – it may say something like your password has expired, please update by clicking this link (directing you to a spoofed website)
- Most emails will have grammar errors – This could be one misspelled word or random capitalisations in the emails. The errors are usually very subtle, and often resemble something that would have come from a trusted source.
- The hyperlink goes somewhere else – Anyone can change the hyperlink in an email to say something completely different. Before you click, hover over the link to check where it will really take you.
- Beware of anything before the forward slash – Adding periods or dashes before the forward slash tricks people into clicking the link because it looks like the right URL at first glance. For example http://payapl.com-stz.info/ isn’t going to paypal.com. By adding periods or dashes before the forward slash or using a misspelling that’s hard to spot, it takes users to a different domain
Similar articles you might like...
I'm currently self-isolating by myself. It's not easy, but I know a lot of other people are in the same situation as me, so I've put together some simple pieces of advice on to keep productive and sane during this strange time.
The Recruitment Canaries Spring Conference 2020
Since June 2018 we have organised afternoon conferences on a bi-yearly basis in order to bring recruitment leaders together to hear from industry experts, be inspired influential speakers and network together.
Windows 10 Deployment Engineer - IT Volunteers
Portsmouth, United Kingdom
£0 - 1 per hour
Volunteers Windows 10 Rollout Engineer / VIP Support Working for the Public Sector Volunteers wanted by a Public Sector body based in Portsmouth to assist them in a Windows 10 rollout and the subsequent...
1ST/2ND Line Support - IT Volunteer
Portsmouth, United Kingdom
£0 - 1 per hour
1st / 2nd Line Support Engineers - IT Volunteers – Public Sector IT Volunteers required by a Portsmouth based Public Sector body. Our customer is running a number of IT Projects and has a...
BI Developer (R / Python) / NHS / Remote Working / Volunteer
Sheffield, United Kingdom
BI Developer (R / Python) / NHS / Remote Working / Volunteer Power BI Developers – The NHS needs youVIQU are working with the NHS by supporting them with outstanding IT projects with IT Professionals suitable...
Project Coordinator - Windows 10 Upgrade Project
Middlesex, United Kingdom
£150 per day
A Project Coordinator is required to join a Public Sector NHS Trust in London to assist on a Windows 7-10 upgrade project.The successful Project Coordinator will work alongside the Project Manager and Windows 10 Deployment...
Python Developer - Contract - Remote
Westminster Bridge, United Kingdom
£300 - 400 per day
A Python Developer is required to join a leading Security and Defence Technology company on initial 8-week contract.The Python Developer will be working fully remote assisting with the back-end coding/ development using Python and have...