A relatively young ransomware family, Ryuk, in particular gained popularity in 2020. Whereas there were just 5,123 recorded Ryuk attacks reported through the third quarter of 2019, there were 67.3 million through the third quarter of 2020. This represents one-third of all 2020 ransomware attacks.
“The increase of remote and mobile workforces appears to have increased the prevalence of Ryuk, resulting in financial losses and impacts on health care services,” says Dmitriy Ayrapetov, SonicWall vice president for platform architecture.
“Ryuk is especially dangerous because it’s targeted, manual and often leveraged via a multistage attack preceded by Emotet and TrickBot malware. Therefore, if an organization has Ryuk, it’s a pretty good indication that it’s infested with several types of malware.”
So how can businesses protect against Ryuk? SonicWall Capture Advanced Threat Protection (ATP) with patent-pending Real-Time Deep Memory Inspection (RTDMI), protects against all Emotet, TrickBot and Ryuk ransomware variants.
IoT threats grow
COVID-19 led to an unexpected flood of devices on networks, resulting in an increase of potential threats to companies fighting to remain operational. SonicWall Capture Labs found a 30% increase in Internet-of-Things malware attacks worldwide.
Most IoT devices, like voice-activated smart devices and door chimes, were not designed to prioritize security, making them susceptible to attack and supplying perpetrators with numerous entry points.
“Employees once relied upon the safety that office networks provided, but the growth of remote and mobile workforces has extended distributed networks that serve both the house and home office,” Conner says. “Consumers need to consider whether devices like AC controls and baby monitors are safely deployed. For optimum protection, professionals using home offices, especially those in the C-suite, should consider segmenting home networks.”
Get your CompTIA A+, Network+ White Hat-Hacker, Certified Web Intelligence Analyst and more starting at $35 a month. Click here for more details.