Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12
Next Beyond Email: 5 Alternative Ways to Fall Victim to Ransomware-6 Next

Ransomware Distribution Through Social Media Channels

Like email phishing campaigns, cyber attackers can run elaborate social media phishing scams to distribute ransomware via social media spam. Just by clicking the wrong social media link, an end user can fall victim to dangerous malware, costing money and even online reputations. From malicious links embedded in Facebook videos and Twitter messages, to fraudulent apps and fake links to celebrity profiles, social media users are lured daily by this type of nefarious bait.

Ransomware, without a doubt, is dominating the cyber-threat landscape by holding critical systems and data hostage in industries ranging from health care and finance to government and energy. Ransomware is a class of malware that, when distributed to a system, renders victims' systems unusable by encrypting computers and data or by locking applications. The attacker's goal is to blackmail the victim into paying a ransom in exchange for decryption keys, allowing them to regain control of their systems and data.

Most information and reports about ransomware, however, have focused on phishing as a conduit for ransomware delivery and often overlook other distribution methods in use. Attackers are becoming craftier with their methods to spread malware that encrypts files and locks data, blindsiding victims before they even realize they have been attacked.

So while organizations and individuals are performing everyday tasks – like running their businesses in the cloud and using social media – alternative ways to receive ransomware, which don't require victims to open a phishing email, also pose a serious threat. In this slideshow, Aditya Sood, PhD., director of security and Elastica Cloud Threat Labs at Blue Coat, discusses five alternative ways that organizations can fall victim to ransomware and offers advice on how they can protect themselves.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

BitSightRansomware0x Ransomware: The Rising Face of Cybercrime

Ransomware is a legitimate threat, with estimates from the U.S. Department of Justice showing that over 4,000 of these attacks have occurred every day since the beginning of the year. ...  More >>

Security121-190x128 5 Ways CFOs Can Implement an Effective Cybersecurity Strategy

While cybersecurity concerns are widespread, finance remains one of the most vulnerable areas for malicious attacks. ...  More >>

infra100-190x128 Top 10 Strategic Technology Trends for 2017

Here are the top 10 strategic technology trends that will impact most organizations in 2017. Strategic technology trends are defined as those with substantial disruptive potential or those reaching the tipping point over the next five years. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.