Ransomware has become a serious threat to businesses and individuals worldwide. Between January and July 2021, the FBI noted ransomware attacks increased by 62%. While any form of virus, worm or malware can be harmful, ransomware can be particularly damaging because its goal is to extort funds from the victim of the infection under the threat of data loss or leaks.
Here, we explain some of the different types of ransomware, how they work and what users and systems administrators can do to reduce the risk of infection. If you'd like to take a deeper dive into the subject, you can learn more about ransomware by exploring our glossary pages.
Ransomware can be divided into four key categories, based on the type of threat it presents to its victims.
Computers may become infected by ransomware accidentally through users downloading infected software from malicious websites. Some ransomware is spread in a more targeted fashion by Ransomware as a Service (RaaS) criminal organizations. Professional hacking organizations accept commissions from clients and will handle the infection process, as well as host the servers the malware connects to and handle payments. One common joke is that malware now comes with "customer service," as the hackers assist victims with the process of purchasing cryptocurrencies and making the transfer to pay the ransom.
There are several ransomware strains in the wild today, each with its own infection mechanism. Some of the most well-known ransomware strains are:
What is the most common type of ransomware attack?
Crypto ransomware is the most common type of ransomware attack. This type of ransomware encrypts the victim's files, preventing them from being recovered unless the user pays the ransom.
What are the four most used vectors for ransomware?
Four common attack vectors for ransomware include email attachments, browser pop-ups, instant messages and text messages. Most attacks rely on fooling the user into choosing to run a malicious executable file.
What are the top three causes of successful ransomware attacks?
The most common causes of successful ransomware attacks are user errors, such as falling victim to phishing attacks or poor cybersecurity practices. For example, installing software from an unknown source or plugging unknown USB devices into a computer could allow a ransomware infection to occur.
There are several simple steps organizations can take to protect themselves from ransomware. Making use of antivirus software and ad-blocking tools can reduce the likelihood of an infection occurring. Windows Defender is included with all modern versions of Windows and offers good malware and virus protection with regularly updated definitions and robust heuristics. Ad-blocking can either be performed via browser extensions or by using a VPN with content filtering enabled.
Technical solutions can only go so far, however. It's important to provide good cybersecurity awareness training to your employees, so they're aware of the basic precautions they can take to avoid falling for phishing attacks or social engineering attempts.
Even with these precautions, there's still the risk of falling victim to a new attack that's able to get past your cybersecurity defenses. That's where Veeam's ransomware protection can save the day. Modern ransomware is so sophisticated that some variants can disable Windows System Restore and reach your network drive backups, preventing you from being able to use those to recover your essential data. We use the 3-2-1-1-0 rule to offer maximum protection. Even if your network backups are somehow affected by the ransomware, there will still be an off-site and offline backup for you to fall back on in an emergency.
If you'd like to know more about how Veeam Backup & Replication can help you protect your data from ransomware, contact us today to talk to a salesperson or request a demonstration.
2022 Data Protection Trends
The largest data protection industry report from 3K+ IT leaders