Security News > 2020 > December > When zombie malware leads to big-money ransomware attacks
A much more important question, for ransomware victims and wide-eyed bystanders alike, is: How did the ransomware get in?
In 2020, we conducted a survey of IT managers in 5000 companies in 26 different countries and asked about ransomware attacks.
In a surprising number of ransomware incidents, the immediate delivery mechanism in the attack turns out to be existing malware inside the network.
Simply put, a zombie malware infection inside your network, also known as a bot, can act as a secret remote access Trojan for criminals.
Ransomware crooks use a range of techniques to get their first toehold inside your network, including spamming out phishing attacks, cracking or guessing passwords, and seeking insecure or forgotten remote access servers on your public network.
News URL
Related news
- NoName ransomware gang deploying RansomHub malware in recent attacks (source)
- Six ransomware gangs behind over 50% of 2024 attacks (source)
- Ransomware gang deploys new malware to kill security software (source)
- CISA warns of Jenkins RCE bug exploited in ransomware attacks (source)
- CISA Warns of Critical Jenkins Vulnerability Exploited in Ransomware Attacks (source)
- Most Ransomware Attacks Occur When Security Staff Are Asleep, Study Finds (source)
- Most ransomware attacks occur between 1 a.m. and 5 a.m. (source)
- New Qilin Ransomware Attack Uses VPN Credentials, Steals Chrome Data (source)
- Lateral movement: Clearest sign of unfolding ransomware attack (source)
- BlackByte Ransomware Exploits VMware ESXi Flaw in Latest Attack Wave (source)