Understanding Ransomware

Understanding Ransomware

What You Need to Know About the Malware that Hits Your Data, and Then Your Wallet

Cybercriminals have no shortage of tools at their disposal in their attempts to abuse and take advantage of those they set their sights on. Recently, however, it seems that more and more of them select ransomware as their weapon of choice. Knowing what ransomware is, and how to avoid falling victim to it, is critical to a business’ survival. Fortunately, this particular malware has a few distinct characteristics that make it relatively simple to identify and describe.

Why does it seem like ransomware is popular among online actors with ill intent?

Like many online attacks, ransomware is very descriptively summed up by its name–simply put, it’s malware that allows hackers to demand a ransom. This malware classification follows a simple, but devious, method of attack: the program will encrypt files on the host system and demand that the user pay to regain access to their files, typically asking to be paid in some form of cryptocurrency. To add a sense of urgency to this demand, the extortionist will include a time limit within their demands, threatening to either delete the files or double the amount demanded if the stated deadline passes.

Due to the typically high ransoms that are associated with ransomware, there are some targets that tend to be assaulted more than others. After all, a cybercriminal’s motivation for utilizing ransomware is financial, and so they will be more apt to attack targets with more capital and higher liquidity. This means that businesses are much more likely to be targeted than a private user, although the latter is not unheard of.

How is ransomware spread?

A favorite tactic of malware distributors is the use of email phishing, or sending out deceptive emails that look to fool the recipient into allowing the malware to access their system. These emails can appear to be from a variety of senders, from government organizations to industry peers, and can often be very convincing. The malware is sent along as an attachment that executes once it is opened, bypassing many of the system’s defenses through the user’s permission.

This tendency for malware to spread via phishing provides two more reasons that businesses are so frequently designated as targets: camouflage and points of access.

Business users tend to get lots of emails. Clients, coworkers, and the assorted other contacts that reach the inbox as an employee does their work will give an employee plenty to review, which eventually will lead to the employee managing their email on autopilot. After a member of Human Resources has been working for a while, a folder containing job application materials may not be an out-of-the-ordinary thing for them to receive. If the corrupted email looks legitimate, what cause would an employee have to worry? These assumptions (the ones that lead to short-sighted clicking) are precisely what cybercriminals rely on to infiltrate their victims’ systems.

The other contributing factor to a business is related to these assumptions as well: a high volume of points of access. As they grow, businesses will usually need to take on more employees to support their operations. An unfortunate side effect of this, however, is that as a company grows in potential value to a cybercriminal, it also increases the number of potential access points for a cybercriminal to take advantage of.

Ransomware Titles You Should Know

CryptoLocker

cryptolocker

Zepto

zepto

Cerber3

cerber3

FairWare

fairware

Petya

petya

Wildfire

wildfire

If you see any of these pictures, you are going to need help. At Gatun Technologies, our dedicated technicians can help show you how to altogether avoid the unfortunate situations brought on by ransomware. If you have questions about ransomware, malware of any kind, or if you simply would like tips on how to best protect your data and infrastructure from ransomware, call us today at (844) 567-2540.

Years experience

0+

Years experience
Certified experts

0

Certified experts
End user satisfaction

0%

End user satisfaction
Global reach

0countries

Global reach
Service desk

024/7

Service desk

Our Managed IT services will help you succeed. Let’s get started

Solutions

Comprehensive IT services include

  • router-1807_67aa302b-3a94-46a7-aa3d-66b8928a87d7

    Network

    Cloud services are network dependent, which is why NanoSoft network management and monitoring services have become critical to IT.

  • telephone-operator-4682_c9489618-836b-47ec-8489-e15f613cb10c

    Service desk

    NanoSoft 24/7 support is about maximising service efficiency, resolving problems and driving continuous service improvement.

  • computer-network-1878_39828809-88f9-48e1-9a76-61c99401ec99

    Infrastructure

    NanoSoft ensures your IT infrastructure is always optimised to support the stable and highly available services organisations demand.

  • settings-server-1872_2e41baf2-8789-4215-b430-db35c3899936

    Endpoint management

    Client and server endpoints are managed as one estate, ensuring security and stability while maximising uptime and employee productivity.

  • source-code-1754_2b435bd8-ce76-4910-8137-7d07a3557fa3

    Applications

    NanoSoft supports Software as well as on-premise deployments, ensuring applications are always optimised for the best possible user experience.

  • add-image-5030_dcf585b8-8f3d-48ad-8579-a4ad56d14ba6

    Managed services plus

    NanoSoft provides advanced management tools to clients who want to take their IT Service Management to a higher level.

Benefits

Our services provide a unique range of benefits

  • Control IT Costs

    You can scale your IT Costs according to your requirements and only pay for what you need. Whether that be increasing or decreasing staff, or IT project work.

  • Trusted IT advisor

    Through regular account management meetings your Managed IT service company will be able to oversee your overall IT roadmap and become your trusted advisor.

  • Economy of scale

    As your business grows, its support structure needs to grow, too. When you use a managed IT service you can scale your business up or down with nothing more than a simple discussion.

  • Increased efficiency

    You’ll have your IT needs outsourced to a team of IT experts, and during times where you need additional project support, your managed IT provider supplies the extra staff.

  • Small initial investment

    Managed IT services help you offset the initial investment of technology costs. Rather than spending thousands of dollars on hardware and software upfront.

Stop wasting time and money on technology. Let’s get started

NanoSoft are always accommodating our diverse needs and we feel like they are a part of our company rather than an external supplier.
John H. Bedard, Jr
Pricing and Plan

1 monthly fee for all IT services. No costly surprises

VoIP 16 SC

Designed for businesses with 5 - 10 users
$200 /month / no setup fees / 1 year agreement
Pricing includes unlimited extensions
  • Reduce your phone bill by 80%
  • Eliminate interoffice call charges
  • Teleworkers or travelings sales people make free office calls
  • Unlimited extensions
  • Launch calls from your CRM
  • Eliminate expensive Web Conferencing Services
  • Reduce travel expenses with integrated web conferencing
  • Up to 250 Web meeting Participants (No cost per host, no download files for online meetings)
  • Pre-upload PDF's before meetings
  • Easy to use polling tool for feedback
  • Dial-in to meetings by phone
  • Chat with colleagues
  • Work remotely from anywhere with iOS, Android, and web client
  • Chat, call or meet with customers directly from your website
  • Receive faxes as PDF files in your email
  • Receive transcripts of voicemail to your email
  • Auto Attendant / Digital Receptionist
  • Ring Extenstion & Mobile Simulteanously
  • Call Queuing
  • SLA Alerting
  • Wallboard
  • Call & Queue Reporting
  • Barge In / Listen In / Whisper
  • See Group Recordings
  • Hold with custom Music On Hold
  • Busy Lamp Field
  • Automatic Plug & Play Phone Provisioning
  • Directory (Company & Private Phonebook)
  • * Billed separately 2,500 Minutes overage rate: $0.02 per minute
  • 3 Standard DID
  • 1 Enhanced DID
  • 1 Toll-Free DID
  • Cloud Hosted Server - Overages Billed Separately
  • * Desk phones sold separately

VoIP 32 SC

Designed for businesses with 10 - 25 users
$360 /month / no setup fees / 1 year agreement
Pricing includes unlimited extensions
  • Reduce your phone bill by 80%
  • Eliminate interoffice call charges
  • Teleworkers or travelings sales people make free office calls
  • Unlimited extensions
  • Launch calls from your CRM
  • Eliminate expensive Web Conferencing Services
  • Reduce travel expenses with integrated web conferencing
  • Up to 250 Web meeting Participants (No cost per host, no download files for online meetings)
  • Pre-upload PDF's before meetings
  • Easy to use polling tool for feedback
  • Dial-in to meetings by phone
  • Chat with colleagues
  • Work remotely from anywhere with iOS, Android, and web client
  • Chat, call or meet with customers directly from your website
  • Receive faxes as PDF files in your email
  • Receive transcripts of voicemail to your email
  • Auto Attendant / Digital Receptionist
  • Ring Extenstion & Mobile Simulteanously
  • Call Queuing
  • SLA Alerting
  • Wallboard
  • Call & Queue Reporting
  • Barge In / Listen In / Whisper
  • See Group Recordings
  • Hold with custom Music On Hold
  • Busy Lamp Field
  • Automatic Plug & Play Phone Provisioning
  • Directory (Company & Private Phonebook)
  • * Billed separately 4,000 Minutes overage rate: $0.02 per minute
  • 5 Standard DID
  • 1 Enhanced DID
  • 1 Toll-Free DID
  • Cloud Hosted Server - Overages Billed Separately
  • * Desk phones sold separately

VoIP 64 SC

Designed for businesses with 10 - 55 users
$540/month / no setup fees / 1 year agreement
Pricing includes unlimited extensions
  • Reduce your phone bill by 80%
  • Eliminate interoffice call charges
  • Teleworkers or travelings sales people make free office calls
  • Unlimited extensions
  • Launch calls from your CRM
  • Eliminate expensive Web Conferencing Services
  • Reduce travel expenses with integrated web conferencing
  • Up to 250 Web meeting Participants (No cost per host, no download files for online meetings)
  • Pre-upload PDF's before meetings
  • Easy to use polling tool for feedback
  • Dial-in to meetings by phone
  • Chat with colleagues
  • Work remotely from anywhere with iOS, Android, and web client
  • Chat, call or meet with customers directly from your website
  • Receive faxes as PDF files in your email
  • Receive transcripts of voicemail to your email
  • Auto Attendant / Digital Receptionist
  • Ring Extenstion & Mobile Simulteanously
  • Call Queuing
  • SLA Alerting
  • Wallboard
  • Call & Queue Reporting
  • Barge In / Listen In / Whisper
  • See Group Recordings
  • Hold with custom Music On Hold
  • Busy Lamp Field
  • Automatic Plug & Play Phone Provisioning
  • Directory (Company & Private Phonebook)
  • * Billed separately 6,000 Minutes overage rate: $0.02 per minute
  • 7 Standard DID
  • 1 Enhanced DID
  • 1 Toll-Free DID
  • Cloud Hosted Server - Overages Billed Separately
  • * Desk phones sold separately