New ransomware distribution model: Infect two “friends”, unlock your files for free

In our previous blogs, we have looked at ways through which ransomware moves from being malware used by cyber criminals to extort money from victims to becoming a service that can be rented by anybody who wants to launch such attacks (read more here). This evolution allows ransomware service providers increase their revenues with least effort by […]

Should open source ransomware be banned?

Ransomware has been a growing concern since the last couple of years as the rate and cost of the related incidents saw major increases year over year. In response, NGOs, journalists, and security vendors started to educate the public in this respect. Various security companies invest effort and time in building solutions that would help […]

Ransomware-as-a-service expected to highly increase the number of cyber criminals

Until recently, ransomware attacks used to be carried out by highly skilled, well-motivated professional cyber attackers. The primary purpose was to obtain money in the form of ransom paid in bitcoins in untraceable transactions. But not anymore. Ransomware attacks became available to unskilled, malicious persons as well under the form of ransomware-as-a-service. Find out about […]

EHR adoption is slow for a reason – Ransomware attack forces three hospitals to cancel operations

Almost 3,000 patient appointments and several operations were canceled at three hospitals after a cyber attack involving a variant of Globe 2 ransomware, confirming once again the importance of the ransomware threat to Healthcare and, consequently, the justified reluctance to moving to EHR entirely. The hospitals impacted in this incident were part of the “Northern […]

FBI Urges Ransomware Victims to Report the Attacks

Healthcare organizations in the US fall under the scope of the “Health Information Technology for Economic and Clinical Health (HITECH) Act” which enforces the requirement of reporting data breaches to the authorities, as well as take certain measures when such incidents occur. Each incident that has the potential to affect more than 500 persons must […]

Ransomware stories – Petya, the odd one out

What is Petya and how is it different from other ransomware? Petya ransomware is meant to prevent users from accessing their data and force them to pay ransom in order to recover it. However, unlike other types of ransomware, it does not use encryption to compromise the files one by one, which may take time […]