Understanding and Preventing Ransomware Attacks

  • JUNE 10TH, 2024
  • 2min read
Understanding and Preventing Ransomware Attacks

Introduction

Ransomware is a type of malware that encrypts files on a device, making them inaccessible until a ransom is paid. This is often done through a malicious email attachment, a link, or by exploiting vulnerabilities in software. CDK Global and Change Healthcare suffered ransomware attacks and paid $25 and $22 million, respectively.

Some Ransomware Attack Paths

  • Malicious Website: Visiting compromised, or fraudulent websites can result in ransomware being downloaded to your device without your knowledge.
  • Phishing: Ransomware can be introduced through phishing emails with malicious attachments or links, exploiting vulnerabilities in software or operating systems, or via infected USB devices.
  • Vulnerabilities: Exploiting known vulnerabilities in software, operating systems, or network devices can provide entry points for ransomware attackers. These vulnerabilities may be due to coding errors, unpatched updates, or misconfigurations.

Preventing Ransomware Attacks

  • Patch Management: Ensure all software and operating systems are kept up-to-date with the latest security patches.
  • User Privileges: Grant users only the necessary permissions to perform their jobs, reducing the potential for exploitation if a system is compromised.
  • Phishing Attempts: Be cautious of unsolicited emails, especially those asking for personal information or containing suspicious links.
  • Use Security Software: Most security software have configurations that prohibit the execution of unauthorised scripts and guard against malicious access.
  • Windows Script Host: Disable Windows Script Host on Windows OS.

Best Practices

  • Don’t Pay the Ransom: Paying the ransom does not guarantee a decryption key and may encourage further attacks.
  • Infected Device: Disconnect the device from the network to prevent the ransomware from spreading.
  • Report the Incident: Contact your IT department or relevant authorities to report the incident and seek assistance.
  • Emergency Support: If you have been affected by ransomware and need emergency support, contact mdr@cil.support

Explore more CIL Advisories

Phishing Emails

Phishing Emails

IntroductionPhishing attacks are becoming increasingly sophisticated, with malicious actors exploiting current events like the Paris 2024 Olympics Games to run…

DECEMBER 16TH, 2024

Read More
Preventing Deep Fake Scams

Preventing Deep Fake Scams

IntroductionMalicious actors always find creative ways to defraud unsuspecting individuals; deep fake scams are one of the latest ways with…

DECEMBER 9TH, 2024

Read More
Trouble Looms: Ransomware Attacks on the Rise

Trouble Looms: Ransomware Attacks on the Rise

IntroductionRansomware is a type of malware which prevents you from accessing your device and the data stored on it, usually…

DECEMBER 2ND, 2024

Read More

Never miss a CIL Security Advisory

Stay informed with the latest security updates and insights from CIL.

Understanding and Preventing Ransomware Attacks

Contact Us

Message Sent!

Thank you for reaching out. We have received your message and will get back to you shortly.

Check your email for a confirmation from us.

Start a project

Project Request Submitted!

Thank you for your interest. Our team will review your project details and reach out to you soon.

Check your email for a confirmation from us.

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Cookie Policy .