Globally all the business sectors are still struggling to get through the Covid-19 impact, but it’s business as usual for the cybercrooks, who likes more online traffic. Corporate security teams need to be ready with their security infrastructure against a series of cyberattacks during the Covid-19 pandemic when new technologies are adopted for remote collaboration and communication.
A recent checkpoint published report shows, during pandemic lockdown how the malware attacks had grown rapidly with the increase in internet traffic:
What is Ransomware?
- Very recently Indiabulls and Cognizant servers were targeted by the ransomware “Maze“
- The famous and the biggest one was the “WannaCry” ransomware attack, thousands of Windows corporate computers were infected back in 2017
- Mobile app-based ransomware is growing, completely locks your device
- “Locker” is another kind of ransomware which infects the victim’s OS & make it impossible to access the file system, applications
A virus is a trigger-based (normally .exe/ .bat files) software program that is put in the victim’s computer to do some specific con. It generally put in the servers, system registry 3-4 level down by the attackers so that antivirus, snippers won’t be able to see it.
Trojans are genuine-looking files (text, video, image) used to infect the system memory, spy over the system logs, hijack traffic.
Worm – It has the capability of replicating its copies across the victim’s network without user intervention/ any trigger; it overloads CPU processes to downgrade system performance and lead to even system crash down.
Cybercrooks used these Malwares in many forms, unnoticed by the IT security guys :
Zero-day attack – Criminal puts malware in the new servers, switches before hardening so initially system looks okay but after some period vulnerability starts to open up
Brute force attack – A program to try every single type of password; Most of the people don’t change the default password so it’s a very popular attack these days. for Ex. facebook brute
Social Engineering attack – Trap Customers or collude ex-employees to reveal system weaknesses, passwords, etc.
Denial of Service (DoS) attack– Attackers used techniques like HTTP flooding or using Botnets to shut down the server. It’s like thousands of browsing requests from many different computers (DDoS) from a range of attacking IP addresses.
How to Protect against Ransomware:
- It is advised to get an authentic antivirus/ security app installed and update them regularly
- Use WPA2 encryption for your home router
- Periodically scan all files (incl. the zipped, hidden) in your PC, Tablet, Phone
- Check if any site has your default password – if so, change it
- Don’t use pirated software, movie download sites, adult sites, untrusted eCommerce platforms
- Change password for online banking, eCommerce sites, trading platforms every 2-3 month
- Never use free WiFi at coffee shops, Railway platforms, Airports
- Need to upgrade on to cloud-based applications, much secure, and can be rolled back; otherwise, get a system back-up to a hard drive.
- Discard emails from an unknown person, unfamiliar address
- Avoid emails containing untrusted attachments – just delete the Phishing emails generally contains info like a lottery, job offers, freebies, etc.