{"id":44422,"date":"2020-12-03T02:10:00","date_gmt":"2020-12-03T07:10:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=44422"},"modified":"2020-12-03T02:10:00","modified_gmt":"2020-12-03T07:10:00","slug":"ransomware-grows-easier-to-spread-harder-to-block","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2020\/12\/03\/ransomware-grows-easier-to-spread-harder-to-block\/","title":{"rendered":"Ransomware Grows Easier to Spread, Harder to Block"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/www.darkreading.com\/author-bio.asp?author_id=837\">Kelly Sheridan<\/a> &#8211; <strong>Ransomware<\/strong>, already a major enterprise threat, is growing more problematic as operators brainstorm new ways to make their attacks easier to launch and more devastating for victims.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2014\/03\/25\/15\/17\/evolution-296400__340.png\" alt=\"\" width=\"603\" height=\"414\"\/><\/figure><\/div>\n\n\n\n<p>Mitchell Clarke and Tom Hall, both principal incident response consultants for Mandiant, have spent the past year analyzing the evolution in <strong>ransomware<\/strong> activity and watching as attackers grew smarter, intrusions took longer, and ransom demands spiked into the millions. New tactics demand businesses&#8217; attention; as a result, executives have begun to grow concerned.<\/p>\n\n\n\n<p>&#8220;We&#8217;re seeing more and more organizations at the board level, where CEOs and COOs are really asking questions of <strong>ransomware<\/strong>,&#8221; says Hall. &#8220;I don&#8217;t think the industry is catching up to it as widespread as it needs to be.&#8221;\u00a0<\/p>\n\n\n\n<p>Attackers used to &#8220;just throw <strong>ransomware<\/strong> here and there \u2014 maybe you get lucky and get a few systems,&#8221; Clarke adds. WannaCry and NotPetya, both destructive attacks, signified what was to come. Over time, more attackers realized they could generate more profit if they took down a whole organization as opposed to a handful of systems at once.<\/p>\n\n\n\n<p>For the financially motivated <strong>ransomware<\/strong> operators, this was motivation to change their game.  <strong><a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.darkreading.com\/threat-intelligence\/ransomware-grows-easier-to-spread-harder-to-block\/d\/d-id\/1339522&amp;ct=ga&amp;cd=CAEYBioUMTczOTg2MDM1OTA2NjM2MzAxOTQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNE5LSOx6w3XKQJ7yZ7N_gGFsYgooQ\">R<\/a><\/strong><a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.darkreading.com\/threat-intelligence\/ransomware-grows-easier-to-spread-harder-to-block\/d\/d-id\/1339522&amp;ct=ga&amp;cd=CAEYBioUMTczOTg2MDM1OTA2NjM2MzAxOTQyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNE5LSOx6w3XKQJ7yZ7N_gGFsYgooQ\">ead On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Kelly Sheridan &#8211; Ransomware, already a major enterprise threat, is growing more problematic as operators brainstorm new ways to make their attacks easier to launch and more devastating for victims. Mitchell Clarke and Tom Hall, both principal incident response <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2020\/12\/03\/ransomware-grows-easier-to-spread-harder-to-block\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-44422","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=44422"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/44422\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=44422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=44422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=44422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}