Security News > 2020 > December > When zombie malware leads to big-money ransomware attacks
A much more important question, for ransomware victims and wide-eyed bystanders alike, is: How did the ransomware get in?
In 2020, we conducted a survey of IT managers in 5000 companies in 26 different countries and asked about ransomware attacks.
In a surprising number of ransomware incidents, the immediate delivery mechanism in the attack turns out to be existing malware inside the network.
Simply put, a zombie malware infection inside your network, also known as a bot, can act as a secret remote access Trojan for criminals.
Ransomware crooks use a range of techniques to get their first toehold inside your network, including spamming out phishing attacks, cracking or guessing passwords, and seeking insecure or forgotten remote access servers on your public network.
News URL
Related news
- Hackers deploy AI-written malware in targeted attacks (source)
- AutoCanada says ransomware attack "may" impact employee data (source)
- N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks (source)
- New RomCom malware variant 'SnipBot' spotted in data theft attacks (source)
- Microsoft Identifies Storm-0501 as Major Threat in Hybrid Cloud Ransomware Attacks (source)
- Embargo ransomware escalates attacks to cloud environments (source)
- JPCERT shares Windows Event Log tips to detect ransomware attacks (source)
- Ransomware attack forces UMC Health System to divert some patients (source)
- Underground ransomware claims attack on Casio, leaks stolen data (source)
- Casio confirms customer data stolen in a ransomware attack (source)