Cyber Security Update

February / March

Cyber Security Update

Cyber Security Update - February / March 2020

SoftwareONE believes there is a need for additional information when it comes to Cyber Security, as organizations have made it clear that investment in a proper security strategy is paramount. Our monthly Cyber Threat Bulletin provides updates on the most recent threats, the latest breaches and how to react to them in order to stay on top of malware and ransomware threats.

Stay Ahead Of Cyber Threats: February/March Bulletin

Cyber-crime has become a well-organized, global endeavor powered by networks of people with malicious intent. The attackers get their hands on data, encrypt it and then demand a ransom to be paid before releasing data back to the owner. This type of an incident is called a ransomware attack. Such ransomware has in recent years plagued schools, hospitals, and even municipalities.

Could you guess how much money cyber-criminals really made with prominent ransomware in the last six years? The FBI recently reported that ransomware operators have made up to $144.35 million between January 2013 and July 2019. Ranking on top of this list you find the following ransomwares:

  • Ryuk ransomware generating a revenue of $61 million for its operators between February 2018 and October 2019.
  • Dharma ransomware making an amount of $24 million between November 2016 and November 2019.
  • BitPaymer earning around $8 million between October 2017 and September 2019.
  • SamSam allegedly made $6.5 million for its authors by attacking healthcare institutions between 2016 and 2018.

As you can see – cyber-criminals never sleep and ransomware is still one of the favored tactics used by attackers to bypass security controls and gain access to sensitive data which is then used to force a company to pay a ransom and/or be offered on the darknet for sale.

Ransomware incidents have reached a new level of frequency and we expect the number to continue to increase. Affected companies are often willing to pay whatever sum is demanded so they can regain control and get back to business. An ongoing trend that is also reflected in our recent Cyber Threat Bulletin, February / March edition.

A ransomware attack, coming as a computer malware, forced an U.S. maritime base (a military base, where warships and naval ships are docked) offline for more than 30 hours. Ransomware disrupted cameras, door-access control systems and critical monitoring systems at the site. Once an embedded malicious link in the email was clicked by an employee, the ransomware was deployed and enabled the attackers to access mission critical information, and encrypt them, preventing the facility’s access to critical files. The malware further burrowed into the industrial control systems that monitor and control cargo transfer and encrypted files critical to process operations.

Be Prepared & Protect Your Digital Assets

Start your security journey today by staying up-to-date about the latest breaches, malware attacks and other incidents. Join us this month and read our latest Cyber Threat Bulletin to find out more about the latest cyber threats, and attacks and how to prevent them from happening in your company. Download our January edition and stay informed with key information and a list of activities to help you close security gaps.

  • Cybersecurity, Managed Security, Cyber Threat Bulletin
  • Cyber-Threats

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO


Related Articles

  • 14 June 2021
  • Bala Sethunathan
  • Managed Security, Cybersecurity User Awareness, Cyber Threat Bulletin, Cybersecurity

Cyber Security Update May 2021

At present, cloud misconfigurations present a high data breach risk. Get to know these best practices that help to secure your cloud-based assets.

Getting Started with FinOps: Why Cloud Security is Your Step Zero | SoftwareONE Blog

Getting Started with FinOps: Why Cloud Security is Your Step Zero

Whether you’re looking to control costs arising from cloud workloads, fraud, or data breaches, cloud security is the important step zero before starting with FinOps. Learn more.

How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments
  • 26 May 2021
  • Bala Sethunathan
  • Managed Security, Cybersecurity User Awareness, Cybersecurity

How to Avoid Ransomware Attacks to Better Protect Hyperscale Environments

Ransomware attacks come in many shapes and forms and can be extremely damaging to an organization. Learn how to protect your hyperscale environment.