aidarrow-end-inversearrow-endWhy choose AvectoAchieve complianceOperational efficiencycompliancedefendpoint-coloureddefendpoint-thin-2DesktopScaleResources.iconsAsset 21insider-threatsavecto-logo-smallquotation-marksransomwareResources.iconsResources.iconsResources.iconsResources.iconsResources.iconsResources.iconssafePrevent attacksAsset 19social-engineeringTrustedtriangleStop insider attacksAsset 20Resources.iconsResources.iconszero-days
Date published
6/28/2017 1:21:56 PM
Contributor:
James Maude

NotPetya ransomware: Attack analysis

On June 27, 2017 a number of organisations across Europe began reporting significant system outages caused by a ransomware strain referred to as Petya. The ransomware is very similar to older Petya ransomware attacks from previous years, but the infection and propagation method is new, leading to it being referred to as NotPetya. Due to the sudden and significant impact of the attack, it was immediately likened to the WannaCry outbreak causing concerns globally.

Continue reading
Date published
6/27/2017 9:03:04 PM
Contributor:
Andrew Avanessian

Petya ransomware variant strikes on a global scale

Firms across the globe have been hit by a variant of the Petya or Petwrap strain of ransomware impacting Windows servers, PCs, and laptops. Initial reports suggest this latest attack struck The Ukraine initially but it has quickly spread to many other countries including Russia, Spain, France, the UK, The Netherlands, and the US. Currently the attackers are asking for $300 worth of Bitcoins to retrieve access to data, however, there are reports that a business in South Korea has paid $1m to get access.

Continue reading
Date published
5/19/2017 1:12:52 PM
Contributor:
Andrew Avanessian

WannaCry One Week On

It’s been a busy week in the security world. On Friday 12th May 2017 the world was hit by one of the biggest ransomware out breaks in recent times. It reached 74 countries and more than 45,000 systems. By Monday, this was more like 150 countries and 200,000 systems, according to Europol. When a kill-switch was found to disable the virus, it was a matter of hours until new variants were infecting systems at a rate of 3,600 per hour.

Continue reading
Date published
5/13/2017 3:25:08 PM
Contributor:
Andrew Avanessian

WannaCry Ransomware goes global

On Friday, a cyber attack on an unprecedented scale struck a wide range of organizations in over 99 countries across the globe. The ransomware attack, known as WanaCry or WanaCrypt0r shut down IT systems in NHS hospitals and GP surgeries in the UK as well as many large global organizations including Telefonica, FedEx and Renault.

Continue reading
Date published
4/12/2016 12:05:56 PM
Contributor:
Gareth Remblance

Go Go PowerWare Rangers

In the tech world recently there have been discussions regarding a new type of ransomware, which has been dubbed “PowerWare”. It has been named this way due to the fact that instead of using an exploit to download malicious software to run on the users’ machines and encrypt their files, exploits are instead used to invoke PowerShell to do the damage.

Continue reading
Date published
3/10/2016 3:53:23 PM
Contributor:
James Maude

Lockdown Locky

Locky is the latest in an ever increasing range of ransomware threats used by cyber criminals in an expanding and increasingly lucrative market. What makes Locky special is that it appears to have come from the same group behind several large Dridex campaigns showing that they are possibly diversifying their range of attacks.

Continue reading
Date published
11/9/2014 4:21:12 PM
Contributor:
Andrew Avanessian

Malware: An evolutionary story

Earlier this year, a study from IDC and the National University of Singapore (NUS) predicted that enterprises will spend around $500 billion in 2014 on making fixes and recovering from data breaches and malware. In the past few months alone, we've seen Target reveal the cost of its recent breach could reach as much as $148 million. The figures are stark, but for the uninitiated the world of malware and its history is something of a mystery. So, where did they originate? How have they changed? And what does the future of malware look like?

Continue reading