{"id":46146,"date":"2021-07-17T03:09:00","date_gmt":"2021-07-17T07:09:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46146"},"modified":"2021-07-17T03:09:00","modified_gmt":"2021-07-17T07:09:00","slug":"why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/07\/17\/why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them\/","title":{"rendered":"Why ransomware attacks are on the rise \u2014 and what can be done to stop them"},"content":{"rendered":"\n<p>A slew of disruptive <strong>ransomware<\/strong> attacks have rattled the U.S., including the recent massive breach of software company Kaseya, and a&nbsp;<a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-07-06\/russian-state-hackers-breached-republican-national-committee?sref=FpEnCcSH\">reported<\/a>&nbsp;attempted hack on the Republican National Committee. In the aftermath, both the corporate sector and U.S. government officials are scrambling to address how Congress and individual businesses should handle the growing threat.<\/p>\n\n\n\n<p>\u201cWe\u2019ve got a moment in time where you can\u2019t ignore it anymore,\u201d said Sen. Lindsey Graham, R-S.C., at a June 17 press conference to unveil legislation that would target cybercrime. Graham said cyber threats should be considered part of the nation\u2019s core infrastructure.<\/p>\n\n\n\n<p>On July 2, the Miami-based software company Kaseya&nbsp;<a href=\"https:\/\/www.kaseya.com\/potential-attack-on-kaseya-vsa\/\">announced<\/a>&nbsp;it was investigating a possible cyber attack on its VSA software, an IT management tool. According to Kaseya, many customers who use the compromised software provide third-party IT service to between 800,000 and 1 million other companies, intensely magnifying the possible impact of the breach, which used a technique called a \u201csupply-chain attack.\u201d<\/p>\n\n\n\n<p>Kaseya&nbsp;<a href=\"https:\/\/www.kaseya.com\/press-release\/kaseya-responds-swiftly-to-sophisticated-cyberattack-mitigating-global-disruption-to-customers\/\">said Monday<\/a>&nbsp;that the breach compromised just 800 to 1,500 of those companies, still making it one of the largest <strong>ransomware <\/strong>attacks to date. Hackers thought to be associated with the group REvil requested a $70 million payment in Bitcoin to unlock the compromised data. The attack is not thought to have damaged any U.S. critical infrastructure.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.pbs.org\/newshour\/nation\/why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them&amp;ct=ga&amp;cd=CAEYJCoUMTM0NjY4MjY3NjAxMDcxMzYxNjkyGmY5NWQ3ZDU3NzU5MmRlMjE6Y29tOmVuOlVT&amp;usg=AFQjCNHv98Hjt8yDud8UGK3nymjy4aiaHg\" target=\"_blank\" rel=\"noreferrer noopener\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A slew of disruptive ransomware attacks have rattled the U.S., including the recent massive breach of software company Kaseya, and a&nbsp;reported&nbsp;attempted hack on the Republican National Committee. In the aftermath, both the corporate sector and U.S. government officials are scrambling <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/07\/17\/why-ransomware-attacks-are-on-the-rise-and-what-can-be-done-to-stop-them\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":46248,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46146","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46146"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46146\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46146"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46146"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}