Top Ransomware Threats of 2020
The coronavirus pandemic has created a plethora of opportunities for cybercriminals as remote workers are more vulnerable to cyberattacks than their onsite colleagues. According to ChannelPro, ransomware cases surpassed 20 percent worldwide in the first half of 2020. And out of 121.1 million recorded ransomware attacks, 79.9 million work recorded in the United States. What is really scary is that the top ransomware threats of 2020 are far more sophisticated than anything we experienced in 2019.
Ransomware today now has the capability to steal sensitive data through sophisticated techniques, making industries like manufacturing and IT particularly vulnerable.
Is your company prepared to defend itself from some of the most vicious forms of malware in existence these days? Here is a list of some of the top ransomware threats to be aware of in 2020 and beyond:
- Maze Ransomware – Previously known as “ChaCha ransomware,” Maze ransomware is infamous for publishing sensitive information publicly through different methods. Maze ransomware encrypts all files and demands ransom to recover them, then threatens to release the info on the internet if the ransom isn’t paid. However, the threat actor typically publishes one of the victim’s files over the internet anyway. Even if the victim sues Maze, the damage is done. Maze ransomware already has taken down Cognizant, Canon and, allegedly, Xerox.
- Ryuk Ransomware – Ryuk is a crypto-ransomware that blocks access to a file, system or device by using encryption until the ransom is paid. It uses either TrickBot or other means like Remote Desktop Services to gain access to a system. Then, Ryuk uses military-grade algorithms like RSA and AES to encrypt files using a unique key for each executable. Ryuk ransomware typically targets large businesses and government agencies that can afford huge ransoms.
- Tycoon Ransomware – This recently discovered ransomware has been targeting organizations in education and software industries, including SMBs. Tycoon ransomware is deployed in a trojanized version of Java Runtime Environment, making it a bit unusual. Tycoon ransomware has targeted Windows and Linux using the Java image format as part of the attack process. Tycoon ransomware takes advantage of weak or compromised passwords and is a common attack vector that exploits servers for malware.
Considering everything your organization is facing during these challenging times, it can be easy to let your guard down when it comes to cybersecurity. 2W Tech has a thorough Cybersecurity Compliance Program that will protect your organization from cyberthreats and regulation violations alike. Contact us today.
Read More:
Knowledge Management is a Bridge to the Future