Posted on: December 14th, 2016 by Wolf TG Admin

Ransomware-2.jpg One of the biggest emerging threats for businesses is ransomware. In 2015, research analysts found that ransomware has netted over $300M in profits for the cyber gangs affiliated with these attacks. Motivated by these profits, network security experts predict that the next generation of ransomware could cause significant problems for businesses and consumers alike.

Cisco’s 2016 Midyear Cybersecurity Report predicts that the next generation of ransomware will be more targeted and used for more sophisticated exploits. Traditionally, ransomware that attacks enterprises works to encrypt the hard drive of the local machine. The most nefarious strains of ransomware will encrypt any other file that the local machine is able to access.

Ransomware of the future will attack more than just your file shares; next generation ransomware will be designed to cripple your business using non-traditional methods of attack. Let’s take a look at some of the next generation ransomware that could be used to attack your business.

Ransomware That Attacks Your Physical Infrastructure

At DEF CON 2016, security researchers demonstrated how they exploited smart thermostats. In this demonstration, the ransomware locks the administrative capabilities of the smart thermostat while asking the user to pay a ransom. In the meanwhile, the thermostat would pump out heat at 99 degrees until the ransom is paid.

How could this strain of ransomware impact an enterprise? At first glance, you might think that this type of attack would simply make your office staff incredibly uncomfortable due to the high heat.

What if an attacker were potentially able to infect a smart HVAC system that is used to cool an onsite data center? The ransomware could disable cooling, therefore putting your equipment at risk of overheating.

While the researchers who discovered this attack feel like it is an unlikely attack vector, the fact that people have devised methods of exploiting IoT devices that control HVAC systems is definitely something to consider in the future.

Ransomware That Attacks Mobile Devices

Ransomware that attacks mobile devices has already been found in the wild. Today’s mobile device ransomware generally targets the files on the device, as well as any other files that the device is able to access. This includes files that live in cloud services such as Office 365, Box and so on.

Given the profitability of ransomware attacks, next generation ransomware for mobile devices could go a step further than just encrypting your files. When most people install new apps on their mobile devices, they typically breeze right through the terms and conditions while blindly accepting that they will grant the app access to:

  • Use the Camera
  • Determine Location using GPS
  • View your Text Message History
  • View Address Book Contents
  • Use the Microphone

Many security experts have begun asking the question if ransomware could be used to take over a mobile device discreetly, while recording the owners actions or words.

This type of attack would likely have to be a coordinated attack in which a specific person or entity is being targeted. While this type of attack is unlikely, if you work in an industry that deals with privileged knowledge or private data, an attacker might prey upon the fact that you could be motivated to pay a ransom or else risk the data being leaked to the public.

Perhaps this hypothetical scenario isn’t exactly ransomware; it could be subcategorized under ransomware as extortionware.

Your IT staff should be vigilant in ensuring that mobile devices have the most up to date malware and ransomware protections in place. In addition, your IT department should verify that the latest operating system patches are installed to prevent the device from being exploited.

Ransomware that Attacks Cloud Based Services

We briefly touched on how infected mobile devices could potentially hold cloud based data for ransom.

A report published by McAfee says that new ransomware variants will specifically target endpoints that utilize cloud based services. While cloud services may claim that they keep a backup of your data, you should always have an onsite data repository that retains a copy of critical file locations all throughout your network.

McAfee’s report goes on to say that these new strains of ransomware will work to compromise the users credentials while attempting to log into the cloud service to encrypt all of the files that the user has available to them. These ransomware infections encrypt both cloud hosted files and files located on the user’s machine. In this scenario, a user could be completely locked out of their files given the fact that both local and cloud copies of their data have become encrypted by the infection.

System administrators can configure machines to perform a nightly backup of critical data and store it on a server with limited network access. Cloud service providers will likely be able to retrieve a backup of the data that has been encrypted by ransomware, however, this process usually isn’t instantaneous. This can cause serious problems for enterprises that need quick access to their data.

Devising a Strategy to Combat Next Generation Ransomware

While many of the next generation ransomware viruses we have discussed are unlikely to impact your business in the near future, it is always important to weigh the impact of ransomware in your environment and proactively take measures to reduce the likelihood of an infection.

The first line of defense for any enterprise is to provide information security awareness training for all employees. Your IT staff should draft strict data security policies that are designed around reducing the surface area for a ransomware attack. If your IT department is understaffed, bringing in a managed service provider can help your organization achieve maximum data security.

Prepare Your Small Business For An Unexpected Ransomware Attack

Ransomware has become a lucrative endeavor for hackers, making it more likely that they will try to innovate an attack that targets an unnoticed weakness on your network.

The best offense is a good defense, and the first line of defense against ransomware threats is intelligence. Stay up to date on the latest crypto malware attacks. Consider setting up a Google Alert on the topic “Ransomware” so that you can get the latest scoop on an attack; this way, you’ll always be able to know what to lockdown in order to never have deal with the impact of an attack.

If you have any worries about your network security, please call us at (833) 482-6435, or click the banner below to schedule an IT security audit so we can find the best security solutions for your business. Preparation for threats like this is a small cost compared to repairing the damage of an actual infection.

IT Security Audit

If you enjoyed this IT Support article, please check out other posts on our blog and join us on Facebook, Twitter, and LinkedIn, to see how else we can help your Greenville, SC or Atlanta, GA area business succeed!