ransomware | GIGE IT Solutions: IT Services Mississauga http://gige.ca/tag/ransomware IT Services & IT Solutions Mississauga & Toronto Tue, 26 Apr 2022 14:45:20 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.5 https://gige.ca/wp-content/uploads/2017/06/cropped-tab-icon-g-final-32x32.png ransomware | GIGE IT Solutions: IT Services Mississauga http://gige.ca/tag/ransomware 32 32 Securing your Organization’s Network amid COVID-19 https://gige.ca/securing-organizations-network Wed, 27 May 2020 18:16:53 +0000 https://gige.ca/?p=9507 COVID-19 has shaken up the way that we work. In a study conducted by Statistics Canada, it was found that in the 2nd week of April 2020, 5 million employed Canadians worked mostly from home. This is significantly more compared to the 1.7 million that was recorded previously in 2008. The shift to remote work…
Read more

The post Securing your Organization’s Network amid COVID-19 first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Securing your Organization’s Network amid COVID-19 appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
COVID-19 has shaken up the way that we work. In a study conducted by Statistics Canada, it was found that in the 2nd week of April 2020, 5 million employed Canadians worked mostly from home. This is significantly more compared to the 1.7 million that was recorded previously in 2008. The shift to remote work has affected businesses from a wide range of industries, including financial, real estate, and scientific. Due to the rapidness of the COVID-19 developments in the country, many of these organizations were forced to adopt work-at-home models in an extremely short period of time. Remote Deskop Protocol (RDP) and Virtual Private Networks (VPNs) are some of the most common methods of setting up remote work forces. However, due to the rushed timeline, many businesses adopted these strategies without the best practices that were needed to ensure that these connections are secure from cyberattack.

The dark web is a network of underground sites that are known for trading illegal goods and services. It has recently been found that illegal RDP accesses to corporate networks can be found on sale on sites within this network. Prices ranged between USD$10 to USD$100 000 depending on the size of  the company. These illegal connections are often being sold by cyberattackers that have managed to hack into insecure or misconfigured RDP connections.

A buyer of these illegal connections can then utilize it to gain access to an organization’s network, using the infiltration to carry out further cybrattacks. Once a malicious actor gains access to a corporate network, they can launch a variety of malicious attacks on the victim. This can range from implanting malicious software such as data stealing trojans, or installing ransomware to extort money out of their victims.

Best practices to employ when protecting your Remote Connections

Make sure that RDP is only available while your employees are connected to the corporate VPN. This adds an extra layer of security when individuals are trying to connect and remotely control your organization’s computers. Furthermore, employ multifactor authentication on your employee accounts to ensure that malicious individuals who gains access to an employee’s login credentials cannot gain access to the system.

Next, an essential aspect to securing VPN connections is setting up clear policies for employees to connect into the network. Set up clear guidelines for supported operating systems and antivirus software that is up-to-date. Individuals who try to set up connections while on vulnerable machines that are not updated can pose security risks to your organization’s network, as these insecure connections become security vulnerabilities that can be exploited by cyberattackers.

Don’t let insecure RDP and VPN connections cause your organization to be vulnerable. Call GIGE at +1 888 366 4443 or send us an email at info@gige.ca. Our team of network experts will identify and rectify vulnerable areas in your current remote workforce set up.

 

The post Securing your Organization’s Network amid COVID-19 first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Securing your Organization’s Network amid COVID-19 appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9507
Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption https://gige.ca/netherlands-university-clop-ransomware Wed, 12 Feb 2020 18:35:11 +0000 https://gige.ca/?p=9329 Netherlands’ Maastricht University was hit by a ransomware attack on December 23rd, 2019. The university paid the cyberattackers 30 bitcoins, worth at around $220 000 USD, in order to restore the infected computers to working conditions. The ransomware malware strain, called “Clop ransomware”, encrypted 267 of the university’s Windows servers, including backups. The University’s full…
Read more

The post Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
Netherlands’ Maastricht University was hit by a ransomware attack on December 23rd, 2019. The university paid the cyberattackers 30 bitcoins, worth at around $220 000 USD, in order to restore the infected computers to working conditions.

The ransomware malware strain, called “Clop ransomware”, encrypted 267 of the university’s Windows servers, including backups. The University’s full infrastructure consists of 1647 servers running either Linux or Windows, and 7307 workstations. The university reported that it has several network security measures in place including firewalls, antivirus, and spam filters, but that the ransomware was able to bypass these measures through two phishing emails on October 15th and 16th 2019.

The university stated that despite the IT department constantly receiving alerts on security threats, there is still a need for more education on avoiding phishing techniques to help alleviate the constant pressure of cyberattack. For tips on how to detect phishing emails, read our article on the topic here.

Nick Bos, VP of Maastricht university, discussed the decision to pay the ransom to the attackers. He stated that while the University does not ethically stand by the act of succumbing to ransomware extortion, it ultimately made the decision to pay the ransom due minimize the damage that the attack would have on its students’ education, staff, and researchers.

What can we learn from this attack?

  1. Phishing attacks are as prevalent as ever, and can lead to significant financial damage to an organization. Any organization’s firewall is only as strong as its weakest link. As shown in the Clop Ransomware attack, even a network that is protected by antivirus and spam filter software can be penetrated if a malicious link is accidentally clicked on by an employee. Therefore, employee education on common phishing methods and signs to look out for should still be a top priority for your organization’s cybersecurity strategy.
  2. Following the attack, Maastricht University employed Fox-IT to conduct an independent investigation on the incident. In their audit, Fox-IT discovered that the malware was able to leverage a server that was missing critical patches that fixed known vulnerabilities. Exploiting this single security hole allowed the attackers to spread the malware to 267 Windows servers. This highlights the importance of keeping your organization’s server OS up-to-date.

GIGE IT Solutions can keep your organization protected from ransomware. We manage all your servers and workstations to ensure that they are always up-to-date and protected from malware such as ransomware. Call us at +1 888 366 4443 or email us at info@gige.ca to get started.

The post Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Maastricht University Hit By Clop Ransomware, Pays $220 000 USD for Decryption appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9329
Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack https://gige.ca/bitpaymer-ransomware-attack Tue, 04 Feb 2020 17:17:24 +0000 https://gige.ca/?p=9282 The post Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

On October 8th 2019, an unnamed Canadian insurance company paid a total of 950 000 USD to a ransomware cyberattacker.

The attacker was able to infect 20 servers and around 1000 employee computers in the attack, encrypting data on the systems behind a ransomwall, demanding payment of 109.25 bitcoins for the safe release of the information.

It was reported that after paying the ransom fee, the cyberattackers provided decryption keys which allowed for the 20 servers to be decrypted for 5 days, and the 1000 end user computers to be decrypted for 10 days.

What was the ransomware strain responsible for the attack?

The ransomware strain that was used in this attack was “BitPaymer”. The malware was able to bypass the Canadian insurance company’s firewalls and infect its network. It is not known exactly how the malware was able to infiltrate into the company’s infrastructure.

Unlike many other ransomware strains that use strategies such as fake emails and malicious download links or websites to infect computers, it is believed that BitPaymer uses targeted brute force attacks.

Brute Force RDP (Remote Desktops Protocol) Attacks

RDP, or remote desktop protocol, is a tool developed by Microsoft for an individual to remotely connect to another computer. It is often used by IT administrators and cybersecurity professionals to diagnose and troubleshoot computer problems from a remote location. However, RDP is also a prime target for cyberattacks, as it is a direct pathway into a company’s network, if compromised.

A brute force attack tries to guess the credentials to an RDP connection through thousands of trial-and-error attempts done in rapid succession by machines.

Microsoft states that protective actions against RDP brute force attacks include activating multifactor authentication and using VPNs. Multifactor authentication is an added security feature to the login process that sends a temporary ‘second password’ to a trusted device every time an account is accessed from an unfamiliar IP.

Don’t become the victim of a brute force attack. Our team of cybersecurity professionals can identify points of vulnerability in your organizations’ network and provide remediation strategies to keep you protected. Call us at +1 888 366 4443 or email us at info@gige.ca to get started with us immediately.

The post Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Unnamed Canadian Insurance Company Suffers $1M USD Ransomware Attack appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9282
Ransomware Attack Temporarily Shuts Down The Heritage Company https://gige.ca/ransomware-attack-temporarily-shuts-down-the-heritage-company Fri, 10 Jan 2020 17:03:43 +0000 https://gige.ca/?p=9235 The post Ransomware Attack Temporarily Shuts Down The Heritage Company appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

The Heritage Company has temporarily shut down its operations due to a ransomware attack. In December of last year, CEO Sandra Franecke announced to the company’s 300 employees that the company had not fully restored its systems following a ransomware attack that October. As a result of the attack, the company would be temporarily suspending all its functions. In a statement to the company’s employees, she stated that “we do not prevent you from searching for other employment”.

What is data encryption?

Ransomware attacks are a type of cyberattack that encrypts data on a victim’s computer, demanding ransom payment for its release. Encryption is the act of scrambling data into a format that cannot be read unless it is decrypted using a digital key.

Unfortunately the Heritage Company has not been the only ransomware victim in recent times. Over the past year, ransomware  has become increasingly common among small sized businesses. In August of 2019, Wood Ranch Medical, a medical clinic located in California, announced that it was a victim of a ransomware attack. The attack had a widespread impact on the company’s IT infrastructure including its servers and backups, where personal client information was stored. On December 17th 2019, the clinic closed as a result of the damages, stating that the records that were encrypted were lost and could not be recovered.

Ransomware attacks are now targeting backup systems

Ransomware attacks rely on the leverage of releasing encrypted data to extort money from victims. Therefore, if the victims have up-to-date backups of all the sensitive information, it eliminates the pressure point that attackers use. Knowing this, ransomware attacks have started to target the backup systems of victims as well, as illustrated by Wood Ranch Medical. In particular, since mid 2019, data backup manufacturers began warning customers that ransomware attackers were now targeting Network Attached Storage (NAS) devices.

Does paying the ransom fee guarantee safe release?

There have been many instances where encrypted data has not been released even after ransom has been paid. These strains of ransomware, called wipers, are designed to simply destroy the data. An example of a wiper ransomware is “NotPetya”. However, because the victim has no way of guaranteeing that the data cannot be restored, ransom payment is still the only option in many attacks.

Learn more about NotPetya and other ransomware strains by calling us today at 888 366 4443 or emailing us at info@gige.ca

The post Ransomware Attack Temporarily Shuts Down The Heritage Company first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Ransomware Attack Temporarily Shuts Down The Heritage Company appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9235
Ransomware In 2020 Will Be More Vicious Than Ever https://gige.ca/2020-ransomware-evolve-vicious Fri, 27 Dec 2019 18:03:42 +0000 https://gige.ca/?p=9222 The post Ransomware In 2020 Will Be More Vicious Than Ever appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

With 2019 drawing to a close and 2020 almost here, we can take a look sat how the cybersecurity landscape has evolved over this past year. By far the two most prevalent topics of the year have been ransomware and data privacy.

Ransomware

By far the most relevant cybersecurity threat of 2019 was the rise of ransomware. This is strain of malware that encrypts user data behind a paywall, and demands payment for its safe release. Targets have ranged from multinational corporations to governments. Worryingly, ransomware attacks have recently become more organized, as seen in an attack in August 2019 where 22 Texan governments were simultaneously hit with ransowmare.

Data Privacy

As collecting and storing sensitive user data grows as a core requirement of many companies, so too does the risk of leaking this data to unwanted eyes. 2019 saw several enterprises falling victim to data breaches, often leading to devastating financial and legal consequences. New York’s Retrieval-Masters Creditor Bureau Inc. filed for bankruptcy due to a $3.8 million dollar data breach where its customers home addresses, SSNs, and credit card information were leaked. In another attack, Capital One Financial reported between $100 million USD to $150 million USD in damages caused by a data breach leaking customer SSNs and bank account numbers.

In 2020, ransomware will become more dangerous than ever.

A new strain of ransomware named Maze has confirmed a cyberattacker’s bluff as a real threat. In a ransomware attack, data on a victim’s computer is both encrypted and stolen by cyberattackers. Until Maze, it was not known whether cyberattackers actually had access to the stolen data. In November, Allied Universal refused to pay a ransom fee of $2.5 million USD, resulting in cyberattackers releasing 700MB of the company’s sensitive data to the public.

With the threat now confirmed, organizations must prepare for more vicious strains of ransomware in the coming year. Cybersecurity company McAfee Labs predicts that “two-stage extortion attacks” will be a major threat in 2020, where stage 1 is data encryption, and stage 2 is data theft. With 2 leverage points, cyberattackers will have more extortion power than previous attacks.

To counter the new threats coming in 2020, cybersecurity will need to improve in both preventative and restorative measures in order to fully prepare organizations for attack. Call GIGE IT Solutions at +1 888 366 4443 or info@gige.ca. With over 30 years of network security and data backup experience, we can help keep you protected against cyberattack.

 

The post Ransomware In 2020 Will Be More Vicious Than Ever first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Ransomware In 2020 Will Be More Vicious Than Ever appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9222
Ransomware Cyberattackers Now Releasing Stolen Data To The Public https://gige.ca/maze-ransomware-new-ransomware-strategy Fri, 20 Dec 2019 15:00:43 +0000 https://gige.ca/?p=9217 The post Ransomware Cyberattackers Now Releasing Stolen Data To The Public appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

Cyberattackers using ransomware for money extortion have recently adopted a new strategy to force victims into succumbing to their threats – releasing sensitive stolen information to the public. This new strategy was brought to light by a recent cyberattack by the Maze Ransomware strain.

Typically, ransomware cyberattacks force victims to pay ransom fees by locking and encrypting their files behind paywalls. If the business or government that is hit does not have sufficient backups, they suffer major damages to productivity. Because the cost of the attack increases with each passing day that productivity is lost, these organizations opt to pay the ransom fee in order to resume daily functions. While cyberattackers also often threaten to release the files to the public, it is often believed that these threats were bluffed and that the attackers did not actually have access to the files.

The Maze Ransomware confirmed that cyberattackers can indeed access and release the files to the public. In a recent ransomware attack involving the “maze ransomware” this November, victim company Allied Universal refused to pay a ransom fee of 300 bitcoin (around $2.5 Million USD at the time). The cyberattackers then followed through on their threats and released around 700 MB of sensitive data to the public.

 

How are computer being infected with Maze?

Cybersecurity professional Jerome Segura discovered that Maze Ransomware was being spread via a fake cryptocurrency exchange webpage. It is believed that the ransomware was being distributed alongside another exploit, the ‘Fallout exploit kit”, which exploits security holes in Adobe Flash and Windows OS.

Another method of transmission is through malicious email attachments. An example of this was discovered by cybersecurity professional JAMESWT, who discovered a phishing campaign that targeted the Italian population by pretending to be the Italian revenue agency.

Previously, maintaining updated backups was sufficient best practice to protect against ransowmare attacks, as their leverage hinged on the amount of damage that is done to company productivity. In light of the new strategy of data leakage, ransomware protection has to put greater emphasis on preventative measures rather than reactive measures.

This can include strategies such as:

-Educating your employees on proper cyber hygiene and signs to look for when identifying fake emails

-maintaining strict information privilege matrices in the company so that sensitive data is kept on a need-to-access basis.

-strengthening firewalls and keeping software up-to-date

GIGE IT Solutions specializes in designing and managing your IT security for your company. Don’t be the next ransomware victim, and call us at +1 888 366 4443 to get started right away.

The post Ransomware Cyberattackers Now Releasing Stolen Data To The Public first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Ransomware Cyberattackers Now Releasing Stolen Data To The Public appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
9217
What Is Malware and How Can You Stop It? https://gige.ca/malicious-software Fri, 20 Sep 2019 15:22:33 +0000 https://gige.ca/?p=8971 The post What Is Malware and How Can You Stop It? appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

Malware, or malicious software, is any piece of software that is developed with malicious intent. There are many strains of malware that do everything from stealing sensitive data to locking files behind ransom walls.

There are many ways that a computer can become infected with malware. Many of these, such as phishing, rely on user mistakes. Phishing is a method of infecting a computer with malware by attaching fraudulent links or attachments to emails, pretending to be sent from legitimate sellers. Once the user clicks on the fake link, a malicious file is downloaded onto the victim’s computer.

Once a malware infiltrates a computer, it often communicates back with the cyberattacker’s terminal through the internet.

The effects of malware depends on the strain that is used. For example, ransomware is a specific type of malware that encrypts the files on a victim’s computer and demands a ransom to be paid, often in digital currencies, for the data to be released.

Another type of malware is called a botnet. This type forces groups of infected computers to become under the control of the cyberattackers, who then uses the botnet for further malicious activity such as launching Denial of Service (DOS) attacks on other targets.

 

Worm Capability

Some malware have worm capability – this is a functionality that allows it to spread to other computers without user input. This makes worming malware extremely dangerous, as it can spread throughout entire networks without being detected.

An example of a worm-capable malware was Wannacry – a ransomware that was able to infect over 100 000 computers within 24 hours in May of 2017.

 

How do you Stop It?

Keep admin privileges on a need-to-have basis

In general, the less administrative privileges that a company’s computer has, the less of a weak point it is to the network as whole. It is important to keep administrative rights to only a few management devices, so that it is less likely that a key target computer becomes infected.

 

Segmenting your network with air gaps

As described above, worm malware can spread itself across a network without user input. The most secure way to protect your sensitive devices is by disconnecting them completely from the network. That way, if one segment becomes infected, you can be sure that another segment is still secure. Don’t fall victim to cyberattack – let our network experts help you design custom security solutions to keep your company’s data safe.

The post What Is Malware and How Can You Stop It? first appeared on GIGE IT Solutions: IT Services Mississauga.

The post What Is Malware and How Can You Stop It? appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
8971
22 Governments in Texas Hit By First Coordinated Ransomware Attack https://gige.ca/coordinated-ransomware Wed, 28 Aug 2019 19:11:23 +0000 https://gige.ca/?p=8924 On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments. While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According…
Read more

The post 22 Governments in Texas Hit By First Coordinated Ransomware Attack first appeared on GIGE IT Solutions: IT Services Mississauga.

The post 22 Governments in Texas Hit By First Coordinated Ransomware Attack appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
On August 16th, the Texas Department of Information Resources (DIR) stated that 22 local Texan governments were simultaneously hit by coordinated ransomware attacks. They also stated that most of the victims were small-sized local governments.

While government-targeted ransomware attacks are not new, this is the first incident of this scale and level of coordination. According to the Texas DIR, a single attacker was behind all of the attacks.

The city of Keene was one of the 22 cities that were affected. Mayor Gary Heinrich stated that the cyberattacker demanded a total ransom amount of $2.5 million. According to Heinrich, many of the compromised cities had IT software that was externally managed by a third party organization.

 

What is a ransomware attack?

Ransomware is a type of malicious software cyberattack where sensitive data on a victim’s computer is encrypted by an attacker, who demands a ransom to be paid for decryption.

Ransomware attacks have become more prevalent in recent years. Just last month, Florida’s Lake City and Riviera Beach City were both hit by ransomware attacks costing the cities $500 000 each. In September of last year, the town of Midland Canada suffered a similar attack. Laredo, another city in Texas, had in fact been hit by a ransomware attack in May 2019 that heavily impacted their email systems and computers. Their IT has since recovered.

The US Conference of Mayors estimates that at least 170 government bodies have been affected by ransomware since 2013.

What are the strategies to protect yourself from Coordinated Ransomware attacks?

This latest attack illustrates the immediacy of ransomware protection. While the victim in this case was a government, organizations and personal computers are also in constant danger of this type of cyberattack.

Ransomware causes major damage to day-to-day company functions. By ensuring that your most sensitive data is backed up, you can restore data in case of cyberattack. Don’t fall victim to ransomware. Managed Service Providers like GIGE Corporation can help you design and maintain network security and backup solutions. Call us at +1 888 366 4443 or email us at sales@gige.ca to learn more.

 

The post 22 Governments in Texas Hit By First Coordinated Ransomware Attack first appeared on GIGE IT Solutions: IT Services Mississauga.

The post 22 Governments in Texas Hit By First Coordinated Ransomware Attack appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
8924
Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting https://gige.ca/human-error-is-still-a-leading-cause-of-cyber-insurance-incidents Mon, 08 Jul 2019 17:40:07 +0000 https://gige.ca/?p=8773 The post Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

Multinational insurance company CFC Underwriting says that human error still remains a primary factor in the thousands of cybersecurity insurance claims that the company handles. In 2018, the insurance company received over a thousand claims relating to ransomware, malware, data breaches, and data theft. Of these incidents, CFC Underwriting notes that the following human-driven errors were the leading cited causes of cyberattack claims:

 

Phishing Attacks:

A phishing attack is a type of cyberattack that uses malicious links in an email to trick victims into sharing personal information or downloading malware. The emails can be targeted at high-profile victims such as CEOs and CFOs, or can be sent en masse to millions of people. The main danger of this type of attack is that it is often difficult to distinguish between a legitimate or malicious email. Some attackers even construct entirely fake websites with credential fields that send the information directly to their systems. Phishing attacks are a major point of infection for ransomware attacks.

 

Business Email Compromise:

Business Email Compromises (BEC), are a specific type of malicious email attack that targets businesses that conduct wire transfers on a daily basis. The goal of these attacks is to trick these companies into completing transfers to malicious accounts. According to the FBI, around 80 000 cases were reported between October 2013 to May 2018, with a total theft of $12.5 billion.

CFC Underwriting reported that employees not following-up to check if funds were properly transferred was a major cause of the prevalence of this type of attack.

 

Losing a Device:

CFC Underwriting stressed that a common cause for data breach was misplaced or lost devices. Leaving computers and phones that contain sensitive information unattended can lead to accidentally sharing private company data.

 

What can you do to reduce minimize the risk posed by human error?

Human error will always be a risk factor in cybersecurity. Here are some best cybersecurity practices for you to protect yourself:

Stay up-to-date on phishing techniques – by training yourself and employees on key factors to look-out-for in phishing emails, you can significantly reduce risk of infection. See our article on phishing scams to learn more about this type of attack.

Keep track of your company’s devices. A key part of mitigating data breach damage relies on early detection, as seen by the recent data leak at HCL. Keeping a close eye on your devices ensures that missing devices are detected early and that efforts can start on damage mitigation.

Managed IT Security providers like GIGE IT Solutions can help you protect yourself against the risk of human-caused cyberattack. By designing customized IT security plans for your company and monitoring your security and data backup on a 24/7 basis, we ensure that you are always prepared. Call +1 888 366 4443 for an immediate consultation, or email us at info@gige.ca

The post Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Human Error is still a Leading Cause of Cyber Insurance Incidents, says CFC Underwriting appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
8773
Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption https://gige.ca/florida-ransomware-attacks Wed, 03 Jul 2019 17:51:48 +0000 https://gige.ca/?p=8698 The post Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>

The list of ransomware victims continues to grow. Florida’s Lake City and Riviera Beach City have both fallen victim to cyberattack. Both cities have been forced to pay $500 000 each to the attackers in attempts to unlock the encrypted files.

On June 5th, the City of Riviera Beach released an official announcement stating that a “data security event” has occurred. One day later, the Lake City Police Department released a similar announcement, detailing that a ransomware attack had disabled many of the city’s systems, including email, VoIP and credit card channels.

As a result of the attacks, both governments have been thrown back to analog working environments, hand-writing bills and permits while the systems are recovered. Despite the ransom payments, there is no guarantee that the lost data will, or even can, be decrypted by the cyberattackers.

Riviera Beach released that the ransomware virus infected their systems through a malicious link in an email. Lake City, on the other hand, stated that their system was intruded after attacks on multiple fronts of their network.

What is Ransomware?

Ransomware is a type of cyberattack that encrypts data on a computer and asks for a ransom fee for an unlock key. Encryption renders ordinary data unreadable, and can only be decrypted by using the key supplied by the attackers.

This type of attack has seen a massive uptick in recent years. Since January 2016, over 4000 ransomware attacks have occurred daily, according to the U.S. Department of Homeland Security. Targets of these attacks range from households and small organizations to governments.

There are many factors that caused the widespread use of ransomware. Firstly, the rise in cryptocurrency popularity have given attackers an ideal payment channel. Recent years has seen digital currencies such as Ethereum and Bitcoin rise in both usage and value. Bitcoin, for instance, costs around CAD 14 000 as of July 3rd 2019. Some of these currencies are designed to be difficult to track, therefore making them perfect for cyberattackers.

The unpreparedness of companies and governments to deal with ransomware attacks is another reason why this type of attack has been so successful. As demonstrated by the attacks of the Florida cities, ransomware causes significant damage to day-to-day functions. Therefore, businesses and governments are often forced to simply pay the fee to avoid compounding damage.

Don’t fall victim to ransomware. Managed IT service providers can help you design and monitor backups of your data to restore your systems in the event of an attack. GIGE IT Solutions provides customizable backup and security solutions tailored to your business goals. Call us at +1 888 366 4443 for an immediate consult.

The post Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption first appeared on GIGE IT Solutions: IT Services Mississauga.

The post Florida’s Lake City and Riviera Beach City Hit by Ransomware, Pays $500 000 each for Decryption appeared first on GIGE IT Solutions: IT Services Mississauga.

]]>
8698