What’s the lower-hanging fruit for ransomware attackers? What measures could assistance to fend them off, and what is stopping businesses from employing these steps?
They believed they were all established. They patched the Trade Server. They ran Microsoft’s screening script to discover out whether or not the server experienced been exploited. Nope, the examination concluded, you’re clean up as a whistle. So how did this unnamed corporation wind up getting been exploited via ProxyLogon?
“It turns out that they ended up using an before version of that screening script,” SophosLabs Principal Researcher Andrew Brandt recounted about a cyberattack SophosLabs was identified as in to assist out with. “And when they up to date it to a afterwards edition, it in fact showed, ‘Oh, no, you have in fact been exploited.’”
How aggravating, and how damaging, these kinds of a minimal slip like that can be. Imagined you ended up patched? Sorry, you were being erroneous. It’s just a person true-everyday living instance of myriad missteps businesses make that set them up for a ransomware attack. It’s like the aged adage goes: Defenders have to be correct 100 per cent of the time, but the attackers just will need a person time out of a million to sneak in.
In this episode of Threatpost Podcast, I had the pleasure of chatting with Brandt about what helps make businesses sitting down ducks for ransomware menace actors, what ways could help them to protect themselves, and what’s halting them from applying these steps. Make sure to check out his latest report, Relentless REvil, exposed: RaaS as variable as the criminals who use it.
Down load the podcast right here or listen to the episode under.
Sign up for Threatpost for “Tips and Techniques for Improved Danger Hunting” — a Stay party on Wed., June 30 at 2:00 PM ET in partnership with Palo Alto Networks. Master from Palo Alto’s Unit 42 experts the very best way to hunt down threats and how to use automation to help. Register In this article for cost-free.
Some components of this posting are sourced from: