Triple extortion ransomware gangs are becoming popular

914

Till early 2020, ransomware spreading gangs like REvil and Maze were seen indulging in double extortion tactics where they first steal data from a victim’s database and then encrypt it until a ransom is paid.

 

Such extortion-filled ransomware spread ensured that the cyber crooks get a payment for sure as they can even sell the stolen data on the dark web if their victim fails to bow down to the demands of the hackers.

 

But from the end of 2020, a new trend seems to have picked up among ransomware spreading gangs. They are seen indulging in Triple extortion tactics where they contact the clients and customers of their victims and ask them to pressurize the company to cough up the ransom or else their business secrets will be leaked to the world that can lead to further embarrassment in the international markets.

 

So, how to prevent such attacks from hitting a Computer Network/s?

 

Just keep a vigil on the network on the weekends as most of the ransomware attacks launched by international gangs are launched on Fridays or Saturdays and sometimes on Sundays as well.

 

Using anti-malware tools will help in identifying spear-phishing emails that fox employees in clicking on malicious links that end up in the download of ransomware.

 

Always keep the operating system up to date with the latest fixes as it can help in avoiding attacks such as the 2017 WannaCry that infected around 300,000 Windows Machines in just 6 days.

 

Creating awareness among the employees on the do’s and dont’s when they are online can help in keeping most of the malware attacks such as ransomware spread at bay. Like asking them to avoid clicking on malicious links sent by unknown parties through emails and Messages.

 

Avoid regular malware infections by scanning for malicious software tools such as Trickbot, Emotet, and Dridex that often lead to ransomware attacks.

Ad
Naveen Goud is a writer at Cybersecurity Insiders covering topics such as Mergers & Acquisitions, Startups, Cyber Attacks, Cloud Security and Mobile Security

No posts to display