Black Fog Awareness – Mustek https://mustek.co.za MUSTEK – SA’s ICT Supplier of Choice Fri, 08 Dec 2023 07:33:14 +0000 en-GB hourly 1 https://mustek.co.za/wp-content/uploads/2022/08/fav.png Black Fog Awareness – Mustek https://mustek.co.za 32 32 Risk Management Report for SMB Cybersecurity Leaders 2023 https://mustek.co.za/risk-management-report-for-smb-cybersecurity-leaders-2023/ https://mustek.co.za/risk-management-report-for-smb-cybersecurity-leaders-2023/#respond Fri, 08 Dec 2023 07:33:14 +0000 https://mustek.co.za/?p=111972

Black Fog Awareness

Small and mid-sized businesses face unique threats in today’s threat landscape. These organisations don’t command the same resources as large enterprises, yet they must respond to many of the same kinds of cyberattacks.

These attacks increasingly use a sophisticated combination of social engineering, credential compromise, and technical exploits to infiltrate target networks. Organisations with less than 1000 employees often have limited options for protecting themselves in a reliable, cost-effective way.

View this white paper to identify how different leaders and types of organisations are responding to ongoing risk management trends.

#RiskManagement #Ransomware #BlackFog #CyberPrevention

Download
]]>
https://mustek.co.za/risk-management-report-for-smb-cybersecurity-leaders-2023/feed/ 0
Data Breach Prevention https://mustek.co.za/data-breach-prevention/ https://mustek.co.za/data-breach-prevention/#respond Thu, 24 Nov 2022 08:43:13 +0000 https://mustek.co.za/?p=110494

Black Fog Awareness

Despite increased global legislation around data protection, and a heightened consumer awareness around privacy and misuse of data, breaches were up a staggering 33% up on last year. Hardly a week goes by without a major data breach hitting the headlines, with some of the largest global corporations being named and shamed.

Download this e-book: YOUR LINK and learn about the cold truth about cybersecurity in the 21st century.

With data breaches on the rise, it’s time to put serious focus onto anti data exfiltration.

]]>
https://mustek.co.za/data-breach-prevention/feed/ 0
Cyber resilience: uncovering strategies and technologies https://mustek.co.za/cyber-resilience-uncovering-strategies-and-technologies/ https://mustek.co.za/cyber-resilience-uncovering-strategies-and-technologies/#respond Fri, 04 Nov 2022 13:21:53 +0000 https://mustek.co.za/?p=110310

Black Fog Awareness

If you’re like most SMBs today, your company’s data is your biggest asset.

Today’s businesses would be unable to keep going and maintain a competitive edge without embracing open standards and fast communication. These have been especially useful to small and medium-sized businesses (SMBs), allowing even the smallest companies to compete with much larger players and scale to meet global demand. Yet these same technologies have also created more vulnerabilities than ever before. For many businesses, downtime is simply not an option—but just saying so won’t make this a reality.

The old adage that “failing to plan is planning to fail” is even more true when it comes to security. Without strategies and technologies already in place before disaster strikes, the possibility of graceful recovery and restoration of operations is just a distant dream. Unfortunately, the ever-evolving nature of today’s threat landscape presents a greater challenge to today’s organizations that rely on data. Today’s SMBs need concrete resilience strategies to help them avoid growing pains and reduce their vulnerability to threats. In this eBook, we’ll explore the threat landscape, including recent changes to the field of cybersecurity; we’ll then examine the definition of cyber resilience and look at five core strategies to help businesses build and enhance their resilience in the face of today’s threats.

Download the eBook here.

]]>
https://mustek.co.za/cyber-resilience-uncovering-strategies-and-technologies/feed/ 0
Detecting Data Exfiltration – White Paper https://mustek.co.za/detecting-data-exfiltration-why-you-need-the-right-tools/ https://mustek.co.za/detecting-data-exfiltration-why-you-need-the-right-tools/#respond Wed, 19 Oct 2022 09:23:37 +0000 https://mustek.co.za/?p=108914

Black Fog Awareness

#Dataexfiltration is a significant threat to organisations and is implicated in many types of #cybersecurity incidents. ]

For example, ransomware gangs use both encryption that causes operational disruption for the victim and the threat of exposing exfiltrated data if the ransom demand is not paid.


Preventing data exfiltration remains a weakness for many organisations, despite having a complex set of cybersecurity tools already, including data loss prevention (DLP) solutions. A new approach is needed to stop the threat and consequential damage of data exfiltration.

In this white paper, @BlackFog report on a survey on data exfiltration and introduce the category of #Antidataexfiltration (ADX) cybersecurity solutions.

]]>
https://mustek.co.za/detecting-data-exfiltration-why-you-need-the-right-tools/feed/ 0
Detecting Data Exfiltration – Why You Need the Right Tools https://mustek.co.za/detecting-data-exfiltration/ https://mustek.co.za/detecting-data-exfiltration/#respond Tue, 06 Sep 2022 17:21:02 +0000 https://mustek.co.za/?p=108907

Black Fog Awareness

Detecting Data Exfiltration – Why You Need the Right Tools

Cyberthreats have become a leading concern for businesses of all sizes and across all sectors. But while familiar threats such as ransomware can disrupt operations and cost firms time and money, the real risks come from attacks that go further than encrypting files or shutting down machines.

Hackers that seek to exfiltrate data from businesses are a particularly dangerous threat. However, in many cases, the legacy anti malware and intrusion detection and prevention tools that businesses have in place are not well-suited to tackling these problems.

Why Firms Need an Anti-Data Exfiltration Solution

Data exfiltration plays a key role in so-called double extortion ransomware – one of the fastest growing and most dangerous cyberthreats. Once criminals have valuable data , which may be anything from intellectual property such as trade secrets to employee or customer financial information, they have a range of options.

They could, for instance, sell the material on the dark web or take it directly to competitors. However, in many cases, the preferred tactic is to threaten public release of the data unless their ransom demands are met. This can put much more pressure on businesses to give in, as simply turning to backups won’t be enough to make the problem go away.

With many companies feeling they have no choice but to pay up, this has quickly become the most preferred tactic of ransomware groups. In fact, BlackFog’s research showed that last year, out of 292 reported ransomware attacks, more than 80 percent threatened to exfiltrate data, and in 2022, this has risen to 88 percent.

The damage this causes can be severe. It can open enterprises up not only to significant direct financial losses, but ongoing lost business and reputational harm that can take years to recover from. This is in addition to any regulatory action that may be taken if companies aren’t able to protect individuals’ private data.

The Limitations of Traditional Defences

Stopping data exfiltration can be a major problem for many businesses that continue to rely on traditional perimeter defence tools to protect their operations from attack.

The biggest issue with these tools is that they tend to be focused on preventing intruders from breaking into the network in the first place – and no matter how effective they used to be, they have proven ineffective at preventing the types of attacks we see today.

If criminals can bypass intrusion detection and prevention systems, they often have free reign to move within a network and extract valuable data. For example, research by the Ponemon Institute suggests it can take almost 300 days for businesses to detect a data breach within their systems, and then a further three months to effectively contain it.

Firms may look to address these issues with data loss prevention (DLP) tools, but these have been shown to be highly ineffective at stopping the exfiltration of data by advanced criminal organizations.

As well as being difficult to configure and maintain, they are also ill-equipped to deal with threats that originate within the business. Malicious insiders may often find it easy to circumvent these tools with their internal know-how.

Spotting the Tell-tale Signs, You’ve Been Breached

To prevent these problems, organizations must put in place specialized tools that are designed specifically to identify and neutralize data exfiltration attempts, whether they come from external threats or from malicious insiders.

An effective anti-data exfiltration (ADX) solution works by monitoring all activity within your business, especially looking at traffic leaving the network perimeter. While there are of course, many legitimate reasons why data might be leaving the network – from sharing files with customers to updating cloud backups – these will usually have a familiar pattern.

ADX works by using smart analytics to study the behavior of traffic as it exits the network. By learning what normal activity looks like, it can quickly spot anything unusual. For example, this may include larger-than-normal volumes of traffic, data transfers taking place outside working hours, or information being sent to unrecognized or overseas IP addresses.

It automatically blocks these transfers 24/7, stopping attacks and preventing breaches without any action required from the organization. Because ADX works on devices themselves, it’s lightweight and efficient enough to be deployed on every endpoint that might be used to exfiltrate data, including mobile devices.

Find out more about how anti-data exfiltration software is a must for protecting firms from the latest cyberthreats.

Contact: Cloudsales@mustek.co.za

+27 11 237 1000

]]>
https://mustek.co.za/detecting-data-exfiltration/feed/ 0
Major Moments That Changed the History of Ransomware https://mustek.co.za/major-moments-that-changed-the-history-of-ransomware/ https://mustek.co.za/major-moments-that-changed-the-history-of-ransomware/#respond Fri, 05 Aug 2022 06:15:12 +0000 https://mustek.co.za/?p=108540

Black Fog Awareness

Ransomware has seen a rapid rise over the last few years to become one of the most dangerous cyberthreats any business faces today. But this is not a new issue.

Indeed, ever since the first ransomware was delivered via floppy disk in the late 80s, authors of these attacks have sought to constantly evolve their tactics to evade detection and increase the chances of their victims paying out.

To Discover the major moments in the history that have changed the history of Ransomware read the article.

Article:

5 Major Moments That Changed the History of Ransomware

Ransomware has seen a rapid rise over the last few years to become one of the most dangerous cyberthreats any business faces today. But this is not a new issue.

Indeed, ever since the first ransomware was delivered via floppy disk in the late 80s, authors of these attacks have sought to constantly evolve their tactics to evade detection and increase the chances of their victims paying out.

This may include developing more destructive strains of ransomware, adding double or triple extortion threats or targeting their attacks at organizations likely to suffer the biggest impact. It’s therefore vital that organizations ensure they’re up to date with the latest trends and techniques.

However, companies can learn a lot from previous incidents about how ransomware attacks are carried out, the type of businesses they target, and the damage they can cause. Here are a few of the most consequential variants and attacks, and what they’ve taught businesses.

1. Cryptolocker

The 2013 spread of Cryptolocker was one of the first mainstream ransomware variants, and may have been the incident that alerted many cybersecurity professionals to the threat posed. It spread as a Trojan sent via malicious emails and sought out files on infected PCs to encrypt.

It was thought to have targeted a quarter of a million devices over a period of four months, earning its authors around $3 million in the process. This therefore highlighted how lucrative ransomware could be and how many firms would be willing to pay up in order to regain access to their files.

2. WannaCry

Perhaps the most costly ransomware attack in history, the 2017 WannaCry attack was characterized by the speed and scale at which it spread. It reached over 150 countries, affecting organizations such as telecommunications companies and healthcare providers.

While the true number of victims remains unknown, it’s estimated to have cost the global economy more than $4 billion to fix, with the UK’s National Health Service alone costing around $100 million.

The ransomware spread using a vulnerability in Windows, with older machines especially vulnerable. It therefore illustrated the importance of keeping up to date with essential cybersecurity best practices such as regularly patching equipment, as well as reminding firms just how quickly they can lose control of their systems if proper defenses aren’t in place.

3. Petya/NotPetya

WannaCry was far from the only major ransomware to surface in 2017, as the emergence of the Petya the year before swiftly led to the related NotPetya. In this case, it was not only files that were encrypted, but entire systems, as the malware targeted a device’s Master File Table (MFT), making user access impossible.

However, while Petya required a user to open the infected file, the more serious NotPetya was able to spread on its own. What’s more, while Petya infections were recoverable with difficulty (or a payment), the damage NotPetya did to systems was permanent.

In this case, the point was disruption, with NotPetya believed to be a state-sponsored attack targeted at Ukrainian organizations. It marked a new phase of ransomware, with the techniques being used as a weapon of cyberwarfare and not just a way for criminals to make money.

4. Colonial Pipeline

The impact of ransomware outside of IT operations has been growing for some time. Attacks on public services such as local governments throughout the US have illustrated how the problem can seriously impact the lives of citizens, but the knock-on effects that can be caused to critical infrastructure can also be wide-reaching.

In 2021, this resulted in fuel shortages and panic buying up and down the east coast of the US when energy firm Colonial Pipeline came under a ransomware attack. The impact even reached areas not served by the firm as worried citizens sought to stockpile what was available. The company felt compelled to pay a $4 million ransom in order to restore operations and consumer confidence.

While this was agreed with the organization’s insurance provider, and much of the money was later recovered by the FBI, it clearly indicates the severe pressure that businesses can be put under with a ransomware attack.

5. REvil

As ransomware has grown more profitable for hackers, the groups perpetuating these attacks have become ever-more organized, and one of the most notorious and successful ransomware groups has been REvil. Coming to attention in 2020, the Russian-based group offered a Ransomware-as-a-Service model to other criminals and favored double extortion methods that saw them exfiltrate data from targets and threaten to release it publicly unless payments were made swiftly.

At one point, around a third of ransomware infections seen by security researchers used REvil’s malware. One of the most noteworthy attacks was aimed at managed services provider Kaseya in 2021. This spread through the supply chain to the organization’s customers, with up to 1,500 businesses affected.

While the REvil network was said to have been shut down by Russian authorities in early 2022, its tactics to put extra pressure on companies to pay up or face further consequences have been widely emulated and have made ransomware an even more dangerous threat for many businesses.

With ransomware a continually evolving threat, cybersecurity teams can’t afford to stand still. Therefore, they need to take steps to understand their risk profile, identity where weaknesses lie, and put in place strong defences.

Coming under ransomware attack is now a case of when, not if, so it’s vital firms learn the lessons of the past and make sure they’re prepared.

To learn more about How BlackFog can protect your organisation from Ransomware attacks contact Cloudsales@mustek.co.za

BlackFog is Proudly distributed by Mustek

]]>
https://mustek.co.za/major-moments-that-changed-the-history-of-ransomware/feed/ 0
The first step in defending against #date #exfilration is to understand exactly what it is and how it works https://mustek.co.za/the-first-step-in-defending-against-date-exfilration-is-to-understand-exactly-what-it-is-and-how-it-works/ https://mustek.co.za/the-first-step-in-defending-against-date-exfilration-is-to-understand-exactly-what-it-is-and-how-it-works/#respond Fri, 24 Jun 2022 14:11:45 +0000 https://mustek.co.za/2022/06/24/the-first-step-in-defending-against-date-exfilration-is-to-understand-exactly-what-it-is-and-how-it-works/

Black Fog Awareness

The first step in defending against #date #exfilration is to understand exactly what it is and how it works. We’ve covered everything you need to know about #DataExfiltration and how to prevent it here

Cybersecurity is now the biggest challenge that many businesses face. According to AON, cyberattacks leading to sensitive data breaches and ransomware are now the number one concern for businesses in North America and the UK, ahead of issues such as business interruptions, economic slowdowns and supply chain risks.

The costs of these incidents continue to rise, with figures produced by the Ponemon Institute on behalf of IBM noting that in 2021, the average cost

of a data breach reached $4.24 million – the highest figure in the 17 years it has been conducting this research.

A particular threat that businesses must be aware of is data exfiltration. This can have a wide range of expenses, from reputational damage and lost business, through to ransom payments, class action lawsuits and regulatory penalties. As such, it’s vital that businesses are aware of this threat and are taking the right steps to mitigate it.

 What does data exfiltration mean?

The first step in defending against data exfiltration must be to understand exactly what it is and how it works. It is a term used to describe the movement of data OFF a device, as opposed to infiltration, the movement of data ON to the device.

What is data exfiltration?

Data exfiltration is the unauthorised removal of data from a device, which may be an endpoint such as a PC or smartphone or a database server, for example. This form of data security breach can be among the costliest to a business, as it can be extremely hard to spot. Indeed, in many cases, hackers have been able to transfer materials undetected for months, allowing them to build up a huge repository of sensitive data.

How does data exfiltration occur?

There are a few ways in which data exfiltration works, but they essentially come down to two key attack vectors – outsider attacks and insider threats.

Outside attacks often use techniques such as injecting malware or using phishing attacks to steal credentials and gain access to confidential and encrypted data. Once inside, they can copy data and transfer it back to the attackers at will. In some cases, hackers have been found to exfiltrate data for months or even years before being discovered.

Insider threats, meanwhile, originate from a company’s own employees. This may be inadvertently such as users being careless with their data handling, or more intentional. In these cases, a malicious insider may deliberately copy and remove data, which they can then sell on to criminals or deliver to a competitor, for example. In some cases ransomware gangs are actively recruiting insiders https://www.bleepingcomputer.com/news/security/lockbit-ransomware-recruiting-insiders-to-breach-corporate-networks/ to help them breach corporate networks and execute successful attacks.

Why does data exfiltration occur?

For cybercriminals, exfiltrated data is a highly valuable resource. For instance, sensitive information such as personal customer data or corporate financial details can be used directly to commit fraud or sell on to other criminals. However, other confidential information such as trade secrets or other proprietary information may also be of use as part of corporate or even state-level espionage. In fact, a new service known as Industrial Spy , which promotes itself as a marketplace where businesses can purchase their competitors’ data, has recently been set up by threat actors.

Another growing problem is the risk of cyber extortion, where hackers threaten to publicly release private data online. This is often part of a ransomware attack and can also be highly lucrative, as many firms may feel paying up will be cheaper in the long run than dealing with the repercussions of public data exposure. In 2020, research by RUSI found there were 1,200 so-called double extortion ransomware incidents, with over 60% of these aimed at the US and the UK.

What are the implications of data exfiltration?

Falling victim to a data exfiltration incident can have numerous consequences, both financially and reputationally.

Where is the majority of exfiltrated data going?

Hackers are constantly becoming more organised, with criminal gangs increasingly recognising the value of stolen data, both as a resource they can use directly for activities such as ransomware extortion and to sell on easy profit.

BlackFog’s own research indicates that almost a fifth of exfiltrated data (19 percent) ends up in Russia. The dark web is another popular destination for stolen data, where it can be freely shared and traded. In 2022, for example, confidential data on unreleased iMac products were briefly published online by hacking group REvil after Apple refused to pay a $50 million ransomware demand.

Can exfiltrated data hurt your business?

Stolen data can be harmful to a business in a number of ways. Primarily, it can lead to unhappy customers and lost business, as well as the attention of regulators. With tough legislation threatening heavy fines for businesses that fail to protect sensitive data – up to $20 million or four percent of global revenue under GDPR, for example – the financial cost can be high.

Firms that hold extremely sensitive proprietary data or trade secrets could also lose any competitive advantage they have in the market by giving away designs or future development plans to rivals.

All this is before you consider the reputational damage that a data privacy failure can lead to. With consumers more sensitive than ever to misuse of personal information, they will rarely be quick to forgive a company that has proven unable to take care of their data. For instance, McKinsey notes that 87 percent of people will not deal with a firm if they have concerns about its security practices, while 71 percent said they would stop doing business with a company that gave away sensitive data.

What are the long-term costs of data exfiltration?

In the longer term, companies that have fallen victim to data exfiltration can find themselves facing a range of costs. In addition to regulatory penalties, the threat of class-action lawsuits from affected customers can be high.

As well as direct compensation, preventative measures such as credit monitoring services for any users who had financial details stolen can be a major expense. Elsewhere, the reputational damage such incidents can inflict is also huge and is something smaller companies may never recover from. Indeed, it’s claimed that as many as  60 percent of small businesses close within six months of a data breach.

How to prevent data exfiltration

The best defence against data theft is to block it before it happens. Once data has been extracted from a network, the damage is already done, so mitigation and incident response plans can only have a limited impact. You therefore need an anti-data exfiltration, or ADX, solution that stops your business from falling victim in the first place.

How can data exfiltration be prevented?

A key part of any ADX strategy is to monitor all traffic that is leaving the business’ network. Many traditional cybersecurity solutions focus their efforts on protecting the network perimeter against incoming threats.

While this remains an important layer in your cybersecurity defence strategy, relying solely on perimeter defence tactics will leave you  vulnerable should something slip through the net – which, given the prevalence of risks such as zero-day threats, is likely to happen to every business sooner or later.

Therefore, you need to go beyond standard cybersecurity techniques, including data loss prevention (DLP) tools, and look for solutions designed specifically to stop attackers from exfiltrating unauthorised data. This helps you take control of how information flows through your network and ensure that when it is transferred beyond your borders, it is fully authorised and secured.

How can you protect from data loss by negligent, compromised and malicious users?

People who are careless with their credentials – either through weak protections or sharing of details – are among the main causes of data exfiltration. In fact, the Ponemon Institute claims this is the most common root cause of attacks, accounting for 20 percent of all breaches in 2021.

Putting controls in place to prevent reckless behaviour such as password sharing or accessing data via unsecured devices and network connections is a must. However, to be effective, you need to go further to also counter any malicious actor within your business who may be looking to steal data.

To do this, strong ADX solutions must include effective monitoring tools that can keep a close watch on data leaving the network. Using behavioural profiling techniques, suspicious activities – such as users attempting to access resources they do not have permission for or transferring files in an usual way – will be blocked, ensuring that unauthorized data doesn’t leave the network.

The importance of endpoint protection for data exfiltration prevention

Focusing on your endpoint security is another essential part of preventing a data exfiltration attack, and this is something that’s particularly important in the new era of remote and hybrid working, where more business activities take place on personally owned and mobile devices that can often be overlooked by a traditional DLP solution.

For instance, in 2020 – when remote working became the norm for many people – ransomware attacks spiked by 150 percent compared with the previous year. This is no coincidence, as many attackers looked to take advantage of less direct oversight. As these trends are here to stay for many enterprises, on-device security solutions ensure that your threat detection tools extend to every part of your network, no matter where they are or who they belong to.

 

How does BlackFog prevent data exfiltration?

Unlike many other data protection tools, BlackFog uses a layered approach that can identify in real-time any data exfiltration attempts and shut them down before they have a chance to succeed. Our ADX technology provides full on-device protection by blocking outbound data transfer activities to disrupt cyberattacks and protect sensitive data.

With a complete endpoint protection platform to guard against data loss, BlackFog’s unique ADX solution helps block any possible avenue for attackers to conduct a data exfiltration attempt, whether this originates from a hacking attempt, phishing attacks or an insider threat.

Browse our range of products to find out more about how BlackFog ADX can help keep your business safe from the latest threats posed by cybercriminals.

 

BlackFog is proudly distributed by Cloudshop by Mustek, Mustek’s Cloud and Software division.

To learn more or to transact contact: cloudsales@mustek.co.za

]]>
https://mustek.co.za/the-first-step-in-defending-against-date-exfilration-is-to-understand-exactly-what-it-is-and-how-it-works/feed/ 0
Should You Pay a Ransomware Demand? https://mustek.co.za/should-you-pay-ransomware/ https://mustek.co.za/should-you-pay-ransomware/#respond Mon, 13 Jun 2022 10:10:45 +0000 https://mustek.co.za/2022/06/13/should-you-pay-ransomware/

Black Fog Awareness

To pay or not to pay? With over a third of all companies facing this dilemma last year alone we take a look at the pros and cons of paying the #ransom in our latest blog :  #ADX #DataExfiltration #Cybersecurity

Should You Pay a Ransomware Demand?

What are the Pros and Cons?

Receiving a ransomware demand is something every business dreads. It is no longer a matter of if you will get attacked, but when. Ransomware struck one -third of all organisations in 2021 alone. It’s something that every security team will have to deal with.

What’s more, once-standard mitigations such as reverting to backups may no longer be enough to recover data if critical files have been encrypted. Many ransomware demands now threaten to release data publicly if the ransomware demand is not made in a timely manner. Many also release samples to prove they have the data as many victims naively think it’s a bluff or feel they have adequate protections in place.

Other threats may include exposing firms to the threat of regulatory action or initiating DDoS attacks to further disrupt operations. And with the clock ticking, firms have to make quick decisions about whether to pay the ransom to avoid further consequences or brace themselves for the fallout.

The Benefits of Paying a Ransom

Many firms may decide that the easiest way to restore services and remain operational is to simply pay the ransom. As long as everything goes to plan, this can minimize disruption and downtime, as well as avoid significant financial losses beyond the ransom itself.

Some firms may also believe this will help them keep the incident quiet and avoid any adverse publicity – although regulatory reporting requirements may still apply depending on the sector they operate in and the information compromised.

For organizations in critical sectors such as healthcare, utilities or infrastructure, remaining operational may be such an important consideration that paying the ransom is the only viable option.

Disadvantages of Giving in to Ransomware Demands

One of the biggest issues with paying a ransom is that you’re gambling that hacker will keep to their word and restore systems. Unfortunately, when you’re dealing with criminals, there’s no guarantee. In fact, it’s estimated that as many as 92 precent of firms  fail to recover all of their data, with nearly a third losing at least half.

If the hackers have successfully exfiltrated data as part of their attack, there’s also no way of knowing what they’ll do with this, even if a ransom is paid. Many cybergangs make additional revenue by selling the data on the dark web, especially if it contains valuable intellectual property or customer data. This can cause significant long term problems for the organization in terms of lost competitiveness and reputational damage.

Finally, perhaps the biggest issue with paying ransomware is that it encourages future attacks. If the attackers know you pay then they often come back two and even three times, making it impossible to get ahead of the attacks.

This isn’t just bad for the cybersecurity sector as a whole – it also paints a big target on individual businesses. Some estimates suggest 80 percent of companies that pay a ransom will fall victim again. Of these, only around half are thought to come from the original hackers, highlighting how quickly weak and profitable targets are disseminated in the cybercriminal network.

The Impact on Ransomware Insurance

Some firms may reason that if they pay the ransom, they will be able to claim this against their cybersecurity insurance policy. However, this often leads to more problems.

Over the last few years, ransomware payments for these incidents have skyrocketed, and ransomware insurance providers have created very strict policies. In order to mitigate their own losses, insurance carriers are tightening up limits on how much they’ll pay and under what circumstances.

Whether or not an insurance policy will pay can depend on a wide range of factors. Some, such as AXA, have stopped paying out for ransomware altogether, while others are making their coverage terms much tighter, for instance, by increasing their requirements for firms to have comprehensive protections in place.

To learn how to protect your organisation from #ADX #DataExfiltration #Cybersecurity by using BlackFog data security and ransomware protection contact Cloudsales@mustek.co.za

]]>
https://mustek.co.za/should-you-pay-ransomware/feed/ 0
Data Exfiltration 101: How Threat Actors Compromise Networks https://mustek.co.za/data-exfiltration-101-how-threat-actors-compromise-networks/ https://mustek.co.za/data-exfiltration-101-how-threat-actors-compromise-networks/#respond Tue, 29 Mar 2022 07:30:58 +0000 https://mustek.co.za/2022/03/29/data-exfiltration-101-how-threat-actors-compromise-networks/

Black Fog Awareness

Cybercriminals use a wide variety of attack vectors to infiltrate corporate networks. From that point, they may spend weeks or months conducting research, identifying vulnerabilities, and exfiltrating sensitive data to their own servers for data theft extortion. Data exfiltration 101 describes the types of attacks that lead to data exfiltration and why 83% of all attacks rely on it as the primary vector.

There are many kinds of attack vectors. They include everything from malicious email attachments to insider threats and sophisticated technical exploits.

Cybersecurity professionals and IT leaders must constantly allocate resources to detect and prevent attacks on these vectors. Knowing which ones cybercriminals are currently focusing on helps security leaders make efficient use of those resources.

This information is obviously important for detection since detection-based systems tend to narrowly target certain vectors. It’s also important for prevention-based cybersecurity because it informs IT leaders’ greater security strategy. If you don’t know where attacks are coming from, preventing them is a near-impossible challenge.

Global Statistics: Today’s Most Targeted Sectors

Cybercrime trends change based on the specific sectors and industries targeted. According to BlackFog’s 2021 Annual Ransomware report, the most frequently targeted sectors of 2021 were:

  • Technology – 89% increase year-over-year.
  • Healthcare – up 30% year-over-year.
  • Retail – up 100% year-over-year.
  • Government – up 24% year-over-year.

Considering the economic and geopolitical upheaval taking place in Eastern Europe as a result of Russia’s invasion of Ukraine, it’s likely that many of these sectors will see themselves targeted even more in the near future. Government and military agencies in particular are likely to experience concentrated attack efforts made by state-supported cybercriminal organizations.

Your own organization’s risk profile depends on whether it is an enterprise-level organization or a small to mid-size business. Cybercriminals modify their tactics, techniques, and procedures based on the size and preparedness of their victims.

Top 5 Enterprise Attack Vectors

Large enterprises can typically afford to implement a complex set of cybersecurity tools, with. 80% using between 3 and 19 different cybersecurity tools. Many of these tools are industry-leading security platforms operated by highly experienced security personnel.

However, cybercriminals have learned to exploit vulnerabilities in highly complex enterprise security environments. They may focus their efforts on incompatibilities between different enterprise tools or compromise trusted accounts and try to hijack those tools for their own use.

Some of the most common attack vectors today’s enterprises face include:

Fileless Malware Attacks

Fileless attacks rely entirely on the exploited system’s memory, running without requiring installation. Fileless malware often consists of malicious code injected into running processes like JavaScript, which makes it incredibly difficult to detect by conventional means.

Phishing and Spear Phishing

Phishing attacks remain one of the most common entry points cybercriminals use to defraud enterprise users. Email remains the most popular format, with special attention to high-value email accounts that receive large volumes of incoming mail.

Potentially Unwanted Programs

It’s common for enterprise employees to unknowingly consent to downloading programs and files alongside legitimate applications. In the past, these applications typically included spyware and adware. Now, cybercriminals are using them to install keyloggers and gain access to privileged user accounts.

Brute Force Password Attacks

While most enterprises have strict password policies, many employees fail to adhere to them. Many organizations still require employees to set eight-character passwords even though attackers can now crack these codes in less than one hour.

Outdated Software on Endpoint and Special-Purpose Devices

Endpoint systems and special-purpose devices running on legacy software are easy targets for hackers. Special-purpose devices can include POS terminals, check-in kiosks, and smart appliances of any kind. Industrial enterprises have additional vectors in their rapidly expanding fleets of Internet-of-Things devices.

Enterprises can improve their security posture by consolidating their security solutions and reducing the complexity of their tech stacks. Overly complex security environments contain many moving parts that highly motivated cybercriminals may successfully bypass.

Small and Mid-Sized Businesses are Particularly Vulnerable

Cybercriminals have learned to target smaller organizations instead of large, well-defended enterprises. They now target smaller businesses that are often unable to adequately defend themselves the way large enterprises can.

More than 80% of smaller organizations have less than 10 cybersecurity tools deployed. One third of these have only one or two tools at their disposal.

Over 40% of cyberattacks target small businesses. Attackers now use highly automated workflows to identify vulnerable organizations and launch attacks to probe their defenses. The three most common types of attacks on small businesses are:

  1. Phishing and Social Engineering Attacks: 57%
  2. Compromised and Stolen Endpoint Devices: 33%
  3. Credential Theft Attacks: 30%

Small and mid-sized businesses can effectively address security risks by hiring qualified managed security service providers who use best-in-class technology. These services often come at a vastly reduced rate compared to in-house expertise, giving smaller organizations access to enterprise-level technology at favorable cost.

However, small businesses must pay close attention to their security partners and the technologies they use. Competent, reputable partners who use a balanced set of technologies (including both detection and prevention-based solutions) are worth the higher rates they often charge.

Anti Data Exfiltration (ADX)

Today’s cybercriminals can use a variety of methods to gain access to protected networks, and there are signs this trend will increase sharply in the near future. Enterprises and small businesses alike should look beyond detection-based solutions to ensure their most sensitive data is truly secure.

All of the attack vectors listed above share a single factor in common. In order for the attack to succeed, data must travel from inside the protected organization to the outside. Attackers must somehow coordinate with software located inside the target’s network.

Data exfiltration protection serves as a critical layer of protection against ransomware, data breaches and malware attacks. This prevents cybercriminals from accessing sensitive data and cuts off communication between compromised accounts and cybercriminal Command & Control centers.

Small businesses, managed security service providers, and large enterprises alike should make this prevention-based technology a crucial part of their overall security posture. Stop cybercriminals from accessing protected data and protect your most sensitive assets from exploitation.

BlackFog proudly distributed by Mustek

Contact Cloudsales@mustek.co.za or complete the form below to get a sales person to contact you

[contact-form-7]
]]>
https://mustek.co.za/data-exfiltration-101-how-threat-actors-compromise-networks/feed/ 0
Ready to learn more about our #ADX #technology? https://mustek.co.za/ready-to-learn-more-about-our-adx-technology/ https://mustek.co.za/ready-to-learn-more-about-our-adx-technology/#respond Thu, 27 Jan 2022 13:51:11 +0000 https://mustek.co.za/2022/01/27/ready-to-learn-more-about-our-adx-technology/

Black Fog Awareness

Take a minute and learn more about BlackFog‘s #ADX #technology in this latest video.

Learn How to keep your business free from #ransomware #cybercrime #dataexfiltration

 

]]>
https://mustek.co.za/ready-to-learn-more-about-our-adx-technology/feed/ 0