{"id":31890,"date":"2019-09-19T03:20:00","date_gmt":"2019-09-19T07:20:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=31890"},"modified":"2019-09-19T03:20:00","modified_gmt":"2019-09-19T07:20:00","slug":"4-ways-hackers-use-phishing-to-launch-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/19\/4-ways-hackers-use-phishing-to-launch-ransomware-attacks\/","title":{"rendered":"4 Ways Hackers Use Phishing to Launch Ransomware Attacks"},"content":{"rendered":"\n<p>MSPs have been on the receiving end of relentless <strong>ransomware <\/strong>attacks in 2019. In June, hackers infiltrated a number of MSPs via their Webroot management consoles. What followed was an\u00a0<a href=\"https:\/\/www.channele2e.com\/news\/msp-judgment-day\/\">all-out assault on MSPs<\/a>\u00a0and MSP client systems, with <strong>ransomware<\/strong> halting businesses, harming reputations, and even resulting in some\u00a0<a href=\"https:\/\/www.msspalert.com\/cybersecurity-breaches-and-attacks\/ransomware\/msp-pays-150000-to-recover-data\/\">high-value ransom payouts<\/a>. In August, 22 Texas municipalities were hit with a <strong>ransomware<\/strong> attack that shuttered city operations, with one high-ranking mayor implicating the MSP.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/www.cyberconservices.com\/wp-content\/uploads\/2019\/09\/scan-3963099__340.jpg\" alt=\"\" class=\"wp-image-31891\" width=\"308\" height=\"172\"\/><\/figure><\/div>\n\n\n\n<p>Security analysts agree that most of these <strong>ransomware<\/strong> attacks were the result of compromised account credentials\u2014usernames and passwords. Phishing is one of the top methods hackers use to compromise user accounts. These are the top four ways phishers gain access.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.vadesecure.com\/en\/3-ways-hackers-use-phishing-to-launch-ransomware-attacks\/&amp;ct=ga&amp;cd=CAEY3gIqFDEyMDA4MDc5MTc1NzEzMjI5MDgzMhpmOTVkN2Q1Nzc1OTJkZTIxOmNvbTplbjpVUw&amp;usg=AFQjCNF_XXFezUJ1ck9r11InGYkgl8aFMg\">Read On: <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>MSPs have been on the receiving end of relentless ransomware attacks in 2019. In June, hackers infiltrated a number of MSPs via their Webroot management consoles. What followed was an\u00a0all-out assault on MSPs\u00a0and MSP client systems, with ransomware halting businesses, <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2019\/09\/19\/4-ways-hackers-use-phishing-to-launch-ransomware-attacks\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-31890","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31890","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=31890"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/31890\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=31890"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=31890"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=31890"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}