Blog da Zscaler

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

News & Announcements

Avoid Paying a King’s Ransom

image
ATRI CHATTERJEE
June 01, 2016 - 2 Min. de leitura

Image

Ransomware has been around for more than 25 years, starting with the AIDS Trojan in 1989 and evolving into more sophisticated trojans, such Gpcode and ROJ.RANSOM.A, in the middle of the last decade. After that, the use of ransomware slowed until 2013, when it made a big comeback as the malware predator of choice with CryptoLocker. In all cases the modus operandi is the same: malware is downloaded onto a computer (desktop or server), after which it restricts access to the machine or encrypts the files on the system’s hard drive and only enables the decryption of these files after the owner has paid a “ransom.” Historically, the perpetrators have demanded a relatively small amount in order to compel people to pay the ransom — quickly.

The cost of infection is at an all-time high

When a formula works, people use it. Because ransomware has been so effective, so it’s no surprise that cybercriminals have expanded its use and broadened their “market” by setting their sights on business. According to the CyberThreat Alliance, a specific strain of ransomware, CryptoWall V3, was responsible for $325 million in damages stemming from almost 407,000 infections involving over 4,000 malware samples.  And 2016 is looking even more lucrative for the attackers and dangerous for the rest of us. According to an FBI  source reported by CNN, cybercriminals collected $209 million from ransoms in just the first three months of 2016.

The best defense is a strong defense

ImageAt Zscaler, we believe that the best defense is to follow best practices to avoid the threat and deploy strong protection to stop it. Since ransomware is always propagated as an executable file, the best protection is to deploy sandboxing technology. Zscaler’s cloud sandbox was recently tested by AV-TEST and found to detect and protect against 99.91 percent of all malicious threats.

We’ve put together a set of resources to help you learn about ransomware, take the right precautions, and deploy the best defenses:

form submtited
Obrigado por ler

Esta postagem foi útil??

Aviso legal: este post no blog foi criado pela Zscaler apenas para fins informativos e é fornecido "no estado em que se encontra", sem quaisquer garantias de exatidão, integridade ou confiabilidade. A Zscaler não se responsabiliza por quaisquer erros, omissões ou por quaisquer ações tomadas com base nas informações fornecidas. Quaisquer sites ou recursos de terceiros vinculados neste post são fornecidos apenas para sua conveniência, e a Zscaler não se responsabiliza por seu conteúdo ou práticas. Todo o conteúdo está sujeito a alterações sem aviso prévio. Ao acessar este blog, você concorda com estes termos e reconhece que é de sua exclusiva responsabilidade verificar e utilizar as informações conforme apropriado para suas necessidades.

Receba as últimas atualizações do blog da Zscaler na sua caixa de entrada

Ao enviar o formulário, você concorda com nossa política de privacidade.