IT disaster recovery, cloud computing and information security news

Corporate ransomware attacks double in 2015

The tools used by cyber-criminals against businesses in 2015 were different to those used against consumers, according to Kaspersky Lab’s review of corporate threats in the last twelve months.  They included greater exploitation of legitimate software programs and malware being signed with valid digital signatures to keep malicious files hidden for longer. Kaspersky Lab’s experts also observed a rise in the number of corporate users attacked by ransomware. 

Kaspersky Lab’s experts found that in 2015 well over half (58 percent) of corporate PCs were hit with at least one attempted malware infection, up three percentage points on 2014.  One in three (29 percent) business computers were exposed at least once to an Internet-based attack; with the exploitation of standard office applications seen three times as often as in consumer attacks.  

Further, 41 percent of business computers faced local threats, such as from infected USB sticks or other compromised removable media.  The experts also noted a seven percent increase in the share of exploits targeting the Android platform, confirming hackers’ growing interest in data stored on employees’ mobile devices.

These attacks were found to be carefully planned, with cyber-criminals taking time to investigate a target company’s contacts and suppliers and even the personal interests and browsing habits of individual employees. This insight was then used to identify legitimate websites for compromise and malware distribution, with the attacks often repeated over time.

In 2015, cyber-criminals and advanced persistent threats (APT) groups focused a great deal of attention on financial services organizations, such as banks, investment funds, and both stock and currency exchanges, including those handling cryptocurrencies.
These attacks included Carbanak, which penetrated the networks of banks, seeking out critical systems that would allow it to withdraw money. One successful attack alone would bring in as much as £1.6 - £6.6 million.  The cyber-espionage group, Wild Neutron also spent much of 2015 hunting down investment companies as well as organizations working with the cryptocurrency Bitcoin and companies involved in mergers and acquisitions.

Kaspersky Lab’s experts observed a growing diversification in attack targets. For example, in 2015, the Chinese APT, Winnti APT switched targets from companies involved in computer games to those in pharmaceuticals and telecommunications.
"The future cyber-landscape for business includes a new attack vector: infrastructure, because almost all of an organization’s valuable data is stored on servers in data centres. We also expect tougher safety standards from regulators, which could lead to more cyber-criminals being arrested in 2016,"- says Yury Namestnikov, senior security researcher at Global Research and Analysis Team, Kaspersky Lab.

Point-Of-Sale terminals, used by retailers and other consumer-facing organizations were another target for attack in 2015, with Kaspersky Lab products blocking more than 11,500 attempts to hack into PoS devices.  The company knows of ten families of programs designed to steal data from PoS terminals, and seven of them appeared for the first time this year.

2015 also saw a doubling of the number of cryptolocker attacks, with Kaspersky Lab detecting cryptolockers on more than 50 thousand corporate machines. This could reflect the fact that ransoms received from organizations can be far larger than those received from individuals.  There is also a greater likelihood of the ransom being paid. Many companies simply cannot function if the information on several critical computers or servers is encrypted and inaccessible.

"Organizations that have fallen victim to a cryptolocker can find themselves faced with a ransom demand to stop a DDoS-attack, decrypt files, or maintain the confidentiality of any stolen information. Because the evidence shows that cyber-criminals don’t always honour the agreement once the ransom has been paid - as happened in the case of the DDoS-attacks on Proton-mail, many of those affected should call in law enforcement and computer security experts, "- says Yury Namestnikov, senior security researcher at Global Research and Analysis Team, Kaspersky Lab.

Kaspersky Lab recommends that companies take steps to reduce risk and to increase their knowledge of the latest threats.  The basic principles of security in corporate networks remain the same: train employees, establish robust  security processes and make full use of new technologies and techniques as each additional layer of protection reduces the risk of network penetration.

To eliminate the threat of ransomware infection, companies should use protection against exploits and ensure that their security solutions include behavioural detection methods.

www.kaspersky.co.uk



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.