{"id":80917,"date":"2015-11-24T18:13:56","date_gmt":"2015-11-24T12:43:56","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=80917"},"modified":"2016-04-14T11:47:02","modified_gmt":"2016-04-14T06:17:02","slug":"ransomware-could-be-the-biggest-security-threat-in-2016","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/ransomware-could-be-the-biggest-security-threat-in-2016\/","title":{"rendered":"Ransomware could be the Biggest Security Threat in 2016"},"content":{"rendered":"<p>While the list of security threat predictions for 2016 is long, the one that concerns home users the most is linked to ransomware &#8211; a malicious program that either locks the infected system or encrypts its data. Once it has done that, it asks for a ransom to let go off the computer or decrypt the data.<\/p>\n<p>As 2015 comes to a close, it\u2019s time to gain perspective of the future by taking a look back at the present year\u2019s events &#8211; in this case, the ransomware.<\/p>\n<p><span style=\"font-size: 15px;color: #006bb2;font-weight: bold\">Some Quick Stats about the Ransomware\u2019s Menace in 2015<\/span><\/p>\n<p>\u2022 A new variant of the ransomware family &#8211; <strong>Teslacrypt<\/strong>, was seen in early 2015. It specifically targets computers with saved games files. Read more about Teslacrypt <a href=\"https:\/\/blogs.quickheal.com\/new-ransomware-alert-teslacrypt-is-after-your-game-files\/\" target=\"_blank\">here<\/a>.<\/p>\n<p>\u2022 A massive surge was detected in the CTB Ransomware &#8211; a relatively new variant.<\/p>\n<p>\u2022 India seemed to have been hit with the highest number of ransomware attacks this year; accounting to <strong>16000<\/strong> infections.<\/p>\n<p>\u2022 The FBI reported a loss of <strong>$18 million<\/strong> because of ransomware attacks worldwide.<\/p>\n<p>Ransomware infections are deemed nasty to such a level that even the FBI stated that they often advise people to pay the ransom. Joseph Bonavolonta, Assistant Special Agent in Charge of the Cyber and Counterintelligence Program in the FBI\u2019s Boston office quoted \u201cThe ransomware is that good&#8230; To be honest, we often advise people just to pay the ransom.\u201d<\/p>\n<p><span style=\"font-size: 15px;color: #006bb2;font-weight: bold\">So, what\u2019s the prediction for ransomware in 2016?<\/span><\/p>\n<p>By the looks of the alarming rate at which the ransomware family is growing, it is wise to assume that this malware is here to stay and not going away anytime soon. For 2016, here\u2019s what ransomware authors may be gearing up for:<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">1. Getting more personal<\/span> &#8211; hackers may threaten people of releasing encrypted information in public. Instances of this have already occurred. \u2018Chimera\u2019 &#8211; a recently launched ransomware campaign in Germany, threatened to release the victims\u2019 encrypted files in public, if the ransom was not paid.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">2. Targeting Macs<\/span> &#8211; with Mac becoming more popular among users, they are likely to become an attractive prey for ransomware.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">3. Extending the ransomware circle<\/span> &#8211; rookie cybercriminals may start offering ransomware as a service, transforming it into a large-scale business-like operation.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">4. Targeting Android <\/span>&#8211; attempts of bringing ransomware to the mobile platform have already been noticed in 2015; a popular example is SimpleLocker. In the coming year, we can expect advanced and more complex variants of the same and others alike.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">5. Better delivery <\/span>&#8211; hackers will use more sophisticated mechanisms to spread ransomware and more valuable ways to extort money from their victims.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">6. Other targets <\/span>&#8211; as more users are becoming aware and getting educated about how to fight ransomware, hackers will target avenues which are still security-deficient such as smart TVs, smart houses, smart fridges, Internet-enabled cars; in short, the Internet of Things.<\/p>\n<p><span style=\"font-size: 15px;color: #990000;font-weight: bold\">7. Life Threatening <\/span>&#8211; Frighteningly, ransomware attacks can turn out to be more than a digital threat to people &#8211; it can become life-threatening. Attackers are now suspected to go after lifesaving medical devices. There could be a horrid situation where a patient is demanded to pay a ransom in order for their pacemaker to be released from a ransomware\u2019s clutches. Read more on this <a href=\"https:\/\/motherboard.vice.com\/read\/ransomware-is-coming-to-medical-devices\">here<\/a>.<\/p>\n<p><span style=\"font-size: 15px;color: #006bb2;font-weight: bold\">Steps you Must Take<\/span><\/p>\n<p>Cyber criminals don\u2019t take time off from creating and improving upon their tactics and that\u2019s why it is essential that we don&#8217;t let our guard down against them. Here are some of the best ways you can protect your device from ransomware:<\/p>\n<p>\u2022 Never download attachments or click links in emails received from unwanted or unexpected sources, even if the source looks familiar.<\/p>\n<p>\u2022 Don\u2019t respond to unwanted pop-up ads or alerts while visiting unfamiliar or even familiar websites.<\/p>\n<p>\u2022 Apply all recommended security updates to your OS, software, and Internet browsers, if not already.<\/p>\n<p>\u2022 Take regular backups of all the important files you have on your computer. We recommend you to begin the backup procedure offline and not when you are connected to the Internet. Doing this will ensure that you do not have to meet the ransomware\u2019s demands.<\/p>\n<p>\u2022 Have a security software installed in your PC that efficiently blocks spam and malicious emails, and automatically restricts access to malicious websites. <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\" target=\"_blank\">Quick Heal Antivirus<\/a> has an inbuilt anti-ransomware defense that detects and stops ransomware that encrypt data. This defense mechanism works on a behavior-based module &#8211; which means, it analyzes programs based on their behavior and the activities carried by them on the users machine. This helps Quick Heal detect malware like ransomware in real-time and prevent possible infections. This anti-ransomware feature remains active in the system even if the antivirus software itself is turned off for some reason.<\/p>\n<p><span style=\"color: #666666\">Sources:<\/span><br \/>\n<a href=\"https:\/\/motherboard.vice.com\">https:\/\/motherboard.vice.com<\/a><br \/>\n<a href=\"https:\/\/www.csoonline.com\">https:\/\/www.csoonline.com<\/a><br \/>\n<a href=\"https:\/\/www.news.com.au\">https:\/\/www.news.com.au<\/a><br \/>\n<a href=\"https:\/\/www.securitymagazine.com\">https:\/\/www.securitymagazine.com<\/a><br \/>\n<a href=\"https:\/\/www.darkreading.com\">https:\/\/www.darkreading.com<\/a><br \/>\n<a href=\"https:\/\/www.botfrei.de\/en\/\">https:\/\/www.botfrei.de\/en\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While the list of security threat predictions for 2016 is long, the one that concerns home users the most is linked to ransomware &#8211; a malicious program that either locks the infected system or encrypts its data. Once it has done that, it asks for a ransom to let go off the computer or decrypt [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":82574,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[289,128,24,910],"tags":[50,1255,1256,18],"class_list":["post-80917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-safety","category-future-watch","category-malware","category-ransomware","tag-ransomware","tag-security-predictions","tag-security-trends","tag-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/80917"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=80917"}],"version-history":[{"count":4,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/80917\/revisions"}],"predecessor-version":[{"id":82576,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/80917\/revisions\/82576"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/82574"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=80917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=80917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=80917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}