Cyber Security Update

February / March

Cyber Security Update

Cyber Security Update - February / March 2020

SoftwareONE believes there is a need for additional information when it comes to Cyber Security, as organizations have made it clear that investment in a proper security strategy is paramount. Our monthly Cyber Threat Bulletin provides updates on the most recent threats, the latest breaches and how to react to them in order to stay on top of malware and ransomware threats.

Stay Ahead Of Cyber Threats: February/March Bulletin

Cyber-crime has become a well-organized, global endeavor powered by networks of people with malicious intent. The attackers get their hands on data, encrypt it and then demand a ransom to be paid before releasing data back to the owner. This type of an incident is called a ransomware attack. Such ransomware has in recent years plagued schools, hospitals, and even municipalities.

Could you guess how much money cyber-criminals really made with prominent ransomware in the last six years? The FBI recently reported that ransomware operators have made up to $144.35 million between January 2013 and July 2019. Ranking on top of this list you find the following ransomwares:

  • Ryuk ransomware generating a revenue of $61 million for its operators between February 2018 and October 2019.
  • Dharma ransomware making an amount of $24 million between November 2016 and November 2019.
  • BitPaymer earning around $8 million between October 2017 and September 2019.
  • SamSam allegedly made $6.5 million for its authors by attacking healthcare institutions between 2016 and 2018.

As you can see – cyber-criminals never sleep and ransomware is still one of the favored tactics used by attackers to bypass security controls and gain access to sensitive data which is then used to force a company to pay a ransom and/or be offered on the darknet for sale.

Ransomware incidents have reached a new level of frequency and we expect the number to continue to increase. Affected companies are often willing to pay whatever sum is demanded so they can regain control and get back to business. An ongoing trend that is also reflected in our recent Cyber Threat Bulletin, February / March edition.

A ransomware attack, coming as a computer malware, forced an U.S. maritime base (a military base, where warships and naval ships are docked) offline for more than 30 hours. Ransomware disrupted cameras, door-access control systems and critical monitoring systems at the site. Once an embedded malicious link in the email was clicked by an employee, the ransomware was deployed and enabled the attackers to access mission critical information, and encrypt them, preventing the facility’s access to critical files. The malware further burrowed into the industrial control systems that monitor and control cargo transfer and encrypted files critical to process operations.

Be Prepared & Protect Your Digital Assets

Start your security journey today by staying up-to-date about the latest breaches, malware attacks and other incidents. Join us this month and read our latest Cyber Threat Bulletin to find out more about the latest cyber threats, and attacks and how to prevent them from happening in your company. Download our January edition and stay informed with key information and a list of activities to help you close security gaps.

Comment on this article

Leave a comment to let us know what you think about this topic!

Leave a comment


Bala Sathunathan

Bala Sethunathan

Director, Security Practice & CISO

Software Portfolio Management

Related Articles

Cyber Security Update
  • 03 June 2020
  • Bala Sethunathan
  • Cybersecurity, Cyber Threat Bulletin
  • Cyber-Security, Cyber-Threats, Ransomware, Cyber-Attacks, Cyber-Crime

Cyber Security Update - May/ June 2020

With more people working from home there are several trends taking place which have continued to heighten the need for the tightest possible cybersecurity.

Backing Up Your Data in Microsoft 365 #2: Handling a Ransomware Attack

Backing Up Your Data in M365: Handling a Ransomware Attack

Is your organization prepared to handle a ransomware attack? Learn about why you must back up your data in Microsoft 365.

What is the focus of your Java strategy?

Where is the Focus of Your Java Strategy?

Compliance, Security, Costs: The key elements of a solid Java licensing strategy.