The Things to Know About Ransomware and Phishing

Cybercriminals are no longer solely attacking big corporations but are increasingly turning their attention to small firms.
Nearly half of the global cyber attacks logged during the course of 2015 were against small companies with fewer than 100 staff, as criminals sought to exploit their digital weaknesses to steal information, bring down websites and send spam. The issue of cyber security for small businesses is made even more pressing by new European Regulations aimed at protecting customer data even after Brexit. The EU’s new General Data Protection Regulation will come into force in 2018 and could result in companies being fined up to €20m or 4% of their annual turnover, whichever is greater, for allowing any security breaches to compromise their customer data.
We highlight two of the biggest ways hackers steal or take control of your data, Ransomware and Phishing.
How Ransomware Works
Cyber criminals can deliver ransomware in different ways. Usually, it’s via links in malicious emails that trigger the automatic download of malware. This malware then takes advantage of vulnerabilities hidden in your software.
Kaspersky’s recent security bulletin states that vulnerabilities in internet browsers are the cause of 62% of malware infections, which include ransomware. The other 38 percent of viruses exploit common software, such as Adobe Flash Player and Java.
Once you download ransomware, depending on what type of ransomware it is, it can either lock your computer screen or encrypt your files using cryptographic keys. The criminal behind the cyber attack will then demand payment before they either unlock your screen or give you the private cryptographic key so that you can un-encrypt your files. Of course, paying this ransom is not a guarantee. Some criminals will take your money and leave you with nothing.
Phishing
Phishing is a way for hackers to gain protected information, tricking people into giving away bank credentials, social security numbers, passwords, and more. That’s why phishing emails are considered to be the main vehicle for identity theft. They look legitimate, and most people don’t realize it’s a scam until it’s too late. Phishing can be categorised in two different ways:
General phishing is sent in a blast for multiple people and acts like a boilerplate trying to attract someone to click and enter pertinent information.
Spear phishing is more direct, and a specific person (or specific group, such as executive, HR, or finance staff) is identified and targeted. The person of interest is sent an email from someone they trust asking for sensitive information. The majority of the time, the email comes from high-profile individuals, such as the CEO emailing someone in the finance department for account information.
Phishing isn’t necessarily as profitable as ransomware, but the value isn’t in the money—it’s in the information. The National Insurance numbers, passwords, and any other information acquired in a phishing attack could be sold to someone else. Phishing attacks can cause more wide-ranging damage than ransomware because your information can be used to give someone a new identity or open up lines of credit in your name.
When it comes to ransomware and phishing, the user is both the strongest defence and the weakest link. Hardware and software can only go so far to protect your systems, but if the user is knowledgeable, ransomware and phishing can be more preventable.
Identifying attacks
- Be very careful about opening unsolicited attachments – most Windows ransomware has been embedded in documents distributed as email attachments
- Emails asking for personal information – it may say something like your password has expired, please update by clicking this link (directing you to a spoofed website)
- Most emails will have grammar errors – This could be one misspelt word or random capitalisations in the emails. The errors are usually very subtle, and often resemble something that would have come from a trusted source.
- The hyperlink goes somewhere else – Anyone can change the hyperlink in an email to say something completely different. Before you click, hover over the link to check where it will really take you.
- Beware of anything before the forward-slash – Adding periods or dashes before the forward-slash tricks people into clicking the link because it looks like the right URL at first glance. For example http://payapl.com-stz.info/ isn’t going to paypal.com. By adding periods or dashes before the forward-slash or using a misspelling that’s hard to spot, it takes users to a different domain
Latest jobs
IT Risk & Controls Lead
London, United Kingdom
£55k - 63k per year
IT Risk & Controls LeadLondon – Hybrid (2 DPM in office)Up to £63,000VIQU have partnered with a leading organisation who are seeking an IT Risk & Controls Lead to join their IT risk management team.The...
Site Supervisor
Stone, United Kingdom
Market Related
Job Title: Site Supervisor Location: Stone (on-site)- must have full UK Driving License. Salary: market- relatedVIQU has partnered with a top engineering company seeking a Site Supervisor to create and manage project plans. The...
Installation Co-Ordinator
Winchester, United Kingdom
£250 - 350 per day
Installation Co-Ordinator – 3-month contract – Hampshire My customer is looking for a proactive and organised Installations Co-Ordinator to manage and support the installation of IT products and services across their trade and supply locations....
Network and Security Specialist
London, United Kingdom
Market related
Network and Security SpecialistLondon – Hybrid (4 days weekly in office)Competitive Salary + Car allowanceVIQU have partnered with a prestigious Fortune 500 company that is looking to hire a Network and Security Specialist. The Network...
Financial Accountant
Stone, United Kingdom
Market related
Financial AccountantStone - HybridCompetitive SalaryVIQU have partnered with a leading entity in operational technology and digital transformation. Operating in highly regulated and demanding industrial sectors, they have successfully executed pivotal projects across energy, nuclear, renewables,...
