Contact us today!


K² Technologies Blog

K² Technologies has been serving the Gillette area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Getting Greedy: Ransomware Hackers are Asking for Way More Money

Getting Greedy: Ransomware Hackers are Asking for Way More Money

If fiscal reasons have stopped you from securing your network against ransomware thus far, you may want to reconsider your strategy. Not only are attacks still becoming more and more prevalent, but the developers of ransomware have lowered the price of admission for aspiring cyber criminals. Fortunately, there are some steps you can take to keep your business protected against a ransomware attack.

First, what is ransomware?
Ransomware is a particularly unpleasant form of malware that, fitting to its name, encrypts your data and demands a ransom for it to be decrypted. However, since this is a cyber criminal at work, there is no guarantee that the files will be restored once the ransom has been paid.

This form of malware can be particularly effective, as many users who could potentially be infected will have little idea what to do, other than pay the ransom. This is especially true of many businesses, which rely on their data for their daily operations.

The cost of ransomware
It’s simple economics, really: by controlling the supply of a commodity that’s in high demand (such as access to business critical data) an individual can set their own price for that commodity. This can be seen in ransomware distributors, who are presumably the only ones who can access the newly encrypted data. As a result, these distributors are able to set their own price, a price which has risen dramatically in recent years.

For example, the average price demanded to decrypt an infected computer was around $294 in 2015. By 2016, the average price had bumped up to $1077. Plus, there were 36 percent more attempts in 2016 than in 2015 -- and while 68 percent of all ransomware infections that took place in 2016 were targeted to consumers, that’s still a very significant number left targeting businesses.

It gets worse
Making what’s already an unfortunate situation even less fortunate, ransomware has become more accessible to more distributors. This is thanks to ransomware-as-a-service tools, that allow even a relative novice to develop and deploy their own ransomware attacks. One particular ransomware, known as Karmen, is available for anyone to use after they pay a one-time fee of $175.

Fortunately, since Karmen is based heavily on Hidden Tear, an open-source ransomware project, there are decryption tools that have been developed to help. Additionally, security researcher Michael Gillespie created an online resource that can help identify what kind of ransomware has infected the system.

We think businesses should by no means wait to be infected before they take action. K² Technologies can help, with knowledge of best practices for your company to follow, and tools to help you recover if ransomware does manage to make its way onto your network. Contact us today at 307-686-3025.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, 24 May 2017
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!


Tag Cloud

Going Green Files Smartphones Electronic Medical Records Google Regulations Black Market User Tips Internet of Things Save Time Unified Threat Management Wi-Fi Privacy Government Wireless Law Enforcement IT Consultant Solid State Drive Backup IT Budget Apple Physical Security Safety Network Processors Saving Money Save Money Social Media Phishing Health Mobile Device Budget Office Mobile Device Managment Disaster Monitors BDR Operating System Password Ransomware Computer Apps Identity Theft Risk Management Cloud Computing Mobile Device Management Cameras Software Settings Outlook Telephone Systems Chromebook Web Server Meetings Dark Data Business Microsoft Office Websites Paperless Office Sync Data Backup Retail Network Congestion Work/Life Balance IT Support Automobile Crowdsourcing Business Management Machine Learning USB Customer Service Google Maps Technology Computer Repair Education Politics App Social Engineering Managed IT Services Data storage Personal Information Maintenance Storage BYOD Network Security Efficiency Taxes Humor Innovation Passwords Email Communication Alert Virtual Reality CCTV Data Data Management Tip of the Week Administrator Licensing Managed Service Provider Microsoft Cabling Malware 3D Printing Computing Gmail Compliance Digital Payment Workplace Tips Windows 10 Mouse Encryption Windows Private Cloud Browser IT Services Automation Smartphone Word Notifications Tech Support Tablet WiFi Botnet How To SaaS Computer Care Virtualization Remote Monitoring Travel Unsupported Software Flexibility Motion Sickness Display Infrastructure Android Office 365 Administration G Suite Upgrades Hosted Solutions Hardware Public Cloud Mobility Printing Uninterrupted Power Supply Software Tips Hackers Best Practices Sports GPS VoIP Computers IT Service Security Emoji Disaster Recovery Money Upgrade Virus Downtime Hard Disk Drive Google Drive Recovery Telephony Google Docs Document Management Cybercrime End of Support Social Point of Sale Firewall Miscellaneous Business Computing Tracking LiFi Samsung Hosted Solution Training Vendor Management Content Filtering IT Solutions Cortana History Business Continuity Help Desk Cloud Outsourced IT Productivity Server Managed IT Services Big Data Internet Staffing Legal Mobile Data Holiday Collaboration Artificial Intelligence Wireless Technology Supercomputer Office Tips Business Growth Error Information Technology Remote Computing Hacker Writing Bring Your Own Device IT Support Productivity Facebook Managed IT Gadget Backups Cleaning Webcam File Sharing Twitter Robot Update Relocation Mobile Devices Small Business Cybersecurity

Blog Archive

Sign Up for Our Newsletter