<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Thu, 30 May 2024 18:50:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Why Ransomware Criminals are Moving Away from Bitcoin</title>
		<link>https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Fri, 29 Jun 2018 21:37:01 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5818</guid>

					<description><![CDATA[<p>Bitcoin used to be the preferred payment method of cybercriminals. Last year, <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks">we reported that the hackers behind the WannaCry ransomware</a> infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because...</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/">Why Ransomware Criminals are Moving Away from Bitcoin</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img decoding="async" class="wp-image-5819 size-medium alignright" src="https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-300x200.jpg" alt="darkweb hacker image" width="300" height="200" srcset="https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-300x200.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-1024x683.jpg 1024w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-768x512.jpg 768w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920-1536x1024.jpg 1536w, https://datarecovery.com/wp-content/uploads/2018/06/hacker-2300772_1920.jpg 1920w" sizes="(max-width: 300px) 100vw, 300px" /></p>
<p>Bitcoin used to be the preferred payment method of cybercriminals. Last year, <a href="https://datarecovery.com/rd/4-game-changing-ransomware-attacks">we reported that the hackers behind the WannaCry ransomware</a> infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because the cryptocurrency&#8217;s transactions are harder to trace to individuals compared to traditional bank transfers.</p>
<p>Some European businesses started to purchase Bitcoin in 2017 in order to prepare themselves for future ransomware demands. Cyber criminals, meanwhile, saw the value of Bitcoin skyrocket, which made the cryptocurrency a target for high-profile cyber theft.</p>
<p>Despite Bitcoin’s continuing popularity and expensive value, several news reports are stating that ransomware criminals are now asking for a different payment method.</p>
<p>While Bitcoin remains a highly popular cryptocurrency among people who deal in the dark web, its high-profile status is giving criminals some problems. <a href="https://www.zdnet.com/article/new-ransomware-headache-as-crooks-dump-bitcoin-for-rival-cryptocurrencies">ZDnet puts the blame on the asset&#8217;s hyper volatility</a> that sometimes jeopardizes criminal operations. A crash doesn&#8217;t only affect investors who have diversified their portfolio with cryptocurrencies, but also criminals who need to keep adjusting their ransom based on the current prices of Bitcoin.</p>
<p>Before 2017 ended, Bitcoin reached an all-time high of $20,000. However, it slid sharply at the start of 2018, and settled at 50% of its December 2017 prices. In June, <a href="https://www.nadex.com/market-news/2018/06/12/news-continues-rock-bitcoin-and-create-volatility">Nadex reported that cryptocurrency markets are being rocked by volatility</a> almost every day. Bitcoin moved 13% lower, and even experienced a $1,000 drop in one trading day. Like any other asset, Bitcoin&#8217;s prices are affected by fundamental factors that affect the economy as a whole. Hacked online exchanges, the strengthening of regulated currencies, and current investor sentiment towards cryptocurrency markets are just some examples of what can affect the price of Bitcoin.</p>
<p>In the same article by ZDNet, it was mentioned that criminals are moving towards more stable forms of cryptocurrency like Monero, Zcash, and Ethereum. With the aforementioned 3 cryptocurrencies, criminals won&#8217;t have to keep adjusting their ransom every time Bitcoin’s prices crash.</p>
<h2>Bad news for altcoins</h2>
<p>The shift to other cryptocurrencies is gaining traction within the dark web. If more cybercriminals move towards other forms of digital funds, it will create problems for investors who have decided to stay away from Bitcoin because of its volatility. Hackers who switch to other cryptocurrencies will disrupt the trust of investors, and make altcoins more volatile. Apart from that, the mass switch by ransomware criminals to other cryptocurrencies will also make it harder for authorities to catch criminals, because they will be investigating multiple cryptocurrencies instead of just Bitcoin. Some new cryptocurrencies are designed to provide almost absolute anonymity to the integrity of the transactions and users, making investigations into cyber-crime money laundering next to impossible.</p>
<p>&#8220;We&#8217;ll see a progressive shift in 2018 towards criminal use of cryptocurrencies other than Bitcoin, making it generally more challenging for law enforcement to counter,&#8221; <a href="https://twitter.com/rwainwright67/status/948169562910052352">warned the Executive Director of Europol Rob Wainwright in a Tweet</a>.</p>
<p>Despite the switch to other cryptocurrencies, many criminals will also continue to use Bitcoin due to its popularity. With more people and companies using it for everyday transactions, there is a higher chance of receiving the ransom.</p>
<p>&#8220;We must remember that when forcing ransom payment, Bitcoin is still the cryptocurrency of choice given its wide availability and use&#8221; <a href="https://www.scmagazineuk.com/why-are-cyber-criminals-dumping-bitcoin/article/734738/">said Thycotic&#8217;s Chief Security Scientist Joseph Carson</a>. “It is when cyber-criminals are moving money around to pay other cyber-criminals or to purchase new toys they will use an alternative cryptocurrency to keep a low profile.”</p>
<p>Did you have your data stolen by ransomware criminals? <a href="https://datarecovery.com/services/">Here on Datarecovery.com we provide fast and affordable solutions</a> to your stolen files. Call us at 800-237-4200 so we can help retrieve what&#8217;s yours.</p>
<p>The post <a href="https://datarecovery.com/rd/ransomware-criminals-moving-away-bitcoin/">Why Ransomware Criminals are Moving Away from Bitcoin</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SamSam Ransomware Infection And Decryption Services</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 11 Apr 2018 20:15:49 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5761</guid>

					<description><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and demand a ransom.</p>
<p>If SamSam has infected your computer or network, turn off computer(s), disconnect all media, and call Datarecovery.com at 1-800-237-4200. Our ransomware experts will assess your situation and offer a plan to restore your files and remove SamSam.</p>
<h2>What is SamSam Ransomware (And How Does It Work)?</h2>
<p>SamSam is a type of crypto-ransomware, which means the malware encrypts files in such a way that only the attacker can decrypt them. If a victim doesn&#8217;t pay the ransom or have current backups, recovery from SamSam is extremely difficult. Hospitals and city governments have found that a SamSam attack cripples the organization&#8217;s ability to function normally, leading some to pay the ransom.</p>
<h3>Notable Targets of SamSam Ransomware Include:</h3>
<ul>
<li><a href="http://www.baltimoresun.com/health/bs-md-medstar-ransom-hack-20160330-story.html">MedStar</a> 27, 2016 ($18,500 ransom)</li>
<li><a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/samsam-ransomware-moves-from-healthcare-to-education">Follet&#8217;s Learning Destiny software</a> 2016 (undisclosed ransom)</li>
<li><a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a> 9, 2017 ($44,000 ransom)</li>
<li><a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">City of Farmington, NM</a> 3, 2018 ($35,000 ransom)</li>
<li><a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a> 11, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">Hancock Health</a> 11, 2018 ($55,000 ransom)</li>
<li><a href="http://www.govtech.com/security/Davidson-County-NC-Still-Reeling-from-Ransomware-Attack.html">Davidson County, N.C.</a> 16, 2018 (undisclosed ransom)</li>
<li><a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">Colorado Dept. of Transportation</a> 21 and March 1, 2018 (undisclosed ransom)</li>
<li><a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">City of Atlanta, GA </a>March 22, 2018 ($51,000 ransom)</li>
</ul>
<p>In addition to these high-profile targets, there have been other unspecified victims. A <a href="https://www.fbi.gov/file-repository/ransomware-prevention-and-response-for-cisos.pdf/view">2016 FBI alert</a> referred to multiple &#8220;attacks on healthcare facilities&#8221; without mentioning specific names. More recently, an <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">unnamed Industrial Control Systems</a> (ICS) company was hit by the ransomware.</p>
<h2>How Does SamSam Ransomware Infect My System?</h2>
<p>Unlike the majority of ransomware, SamSam does not spread through spam emails or malicious links. Instead, the distributors target vulnerable servers using brute-forced credentials or by exploiting outdated software. After gaining access, the hackers harvest other credentials and use <a href="https://msdn.microsoft.com/en-us/library/aa383015(v=vs.85).aspx">Remote Desktop Protocol</a> to manually spread SamSam through a network.</p>
<p>The attackers wait a number of days before executing the ransomware payload, making it harder for organizations to discover the initial breach. This can allow the hackers to reinfect a system if the organization attempts to recover without paying the ransom, as happened with the <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">Colorado Department of Transportation</a>. After sufficient time has passed, the hackers run batch scripts which begin running the ransomware. Once SamSam has encrypted files, it drops a ransom note with the payment demand, which varies by incident.</p>
<h2>Can I Disable or Remove SamSam Ransomware Encryption?</h2>
<p>Removing SamSam and decrypting affected files is difficult. As such, it is critical to prevent the ransomware from infecting systems with the following best practices:</p>
<ul>
<li>Update all software promptly (businesses should use a centralized <a href="https://searchsecurity.techtarget.com/feature/Read-this-roundup-before-investing-in-a-patch-management-tool">patch management system</a> to detect vulnerabilities).</li>
<li>Limit the number of attempts to correctly enter passwords for systems.</li>
<li>Regularly back up data while maintaining redundant copies — SamSam can spread to network-based backups before it begins encrypting files, which makes recovery from an attack more difficult when only one backup exists.</li>
<li>Use the <a href="https://www.us-cert.gov/bsi/articles/knowledge/principles/least-privilege">principle of least privilege</a> to mitigate damage done by ransomware.</li>
</ul>
<p>If your systems have been infected by SamSam, Datarecovery.com can help. We&#8217;ll assess your situation and start you down the road to recovery as soon as you call or <a href="https://datarecovery.com/submit.php">start a case</a> with us.</p>
<p>As with all data recovery situations, time is an important factor. If ransomware has infected your computer or network, call 1-800-237-4200 to speak to a malware expert. We&#8217;ll go over your options and help determine the best way to recover from a SamSam attack.</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infection-decryption-services/">SamSam Ransomware Infection And Decryption Services</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>City of Atlanta Hit by SamSam Ransomware</title>
		<link>https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 02 Apr 2018 01:08:24 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5751</guid>

					<description><![CDATA[<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or...</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-medium wp-image-5752 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg" alt="City of Atlanta Outage Alert, SamSam Ransomware" width="300" height="269" srcset="https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-300x269.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-768x688.jpg 768w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9-1024x917.jpg 1024w, https://datarecovery.com/wp-content/uploads/2018/03/DY6FRveW0AIGpt9.jpg 2048w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or slowed considerably.</p>
<p>For instance, the city is temporarily not accepting employment applications. New water service requests and other planning services can be made in person, but processing times are longer than usual. The Hartsfield-Jackson International Airport <a href="https://www.myajc.com/news/local-govt--politics/city-atlanta-officials-provides-little-detail-about-cyberattack/FK2gvnRumL046dgtXmF5TK/">has disabled its wifi</a> and taken security wait times and flight information off its website out of an abundance of caution.</p>
<p>Perhaps the biggest headache for the city is <a href="http://abcnews.go.com/US/atlanta-cyberattack-massive-inconvenience-city-mayor/story?id=53974558">keeping the courts running</a> during the mayhem. The city court cannot validate warrants or process ticket payments (even in person). Court dates continue being pushed back (via tweets) as the city struggles with the ransomware attack.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">RESET NOTICES WILL BE MAILED. <a href="https://t.co/hyV3pcLSE0">pic.twitter.com/hyV3pcLSE0</a></p>
<p>— ATL Municipal Court (@ATLCourt) <a href="https://twitter.com/ATLCourt/status/978984086265106432?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>Mayor Keisha Lance Bottoms gave few details on what the city&#8217;s response would be.</strong></p>
<p>When asked if she would consider paying the $51,000 ransom, Bottoms admitted, &#8220;Everything is up for discussion.&#8221; She added that she would <a href="https://www.npr.org/sections/thetwo-way/2018/03/27/597208778/atlanta-working-around-the-clock-to-fight-off-ransomware-attack">consult with federal authorities</a> to determine the best course of action. The city hired a private security company, SecureWorks, to investigate the attack. The FBI, Homeland Security, and the Secret Service are all involved in determining exactly what happened.</p>
<p>&#8220;I just want to make the point that this is much bigger than a ransomware attack,&#8221; Bottoms said at a press conference. &#8220;This is really an attack on our government, which means it&#8217;s an attack on all of us.&#8221;</p>
<p><strong>Fears that the attackers accessed personal data continue. </strong></p>
<p>Officials initially <a href="https://www.myajc.com/news/local-govt--politics/atlanta-officials-warn-cyber-attack-may-compromise-sensitive-data/afZLYCO14WySObFATzKXRP/">warned city employees</a> and any member of the public who had made transactions with the city to check their bank accounts for fraudulent activity.</p>
<p>“Because we don’t know, I think it would be appropriate for the public just to be vigilant in checking their accounts and making sure their credit agencies have also been notified,” Bottoms said shortly after the incident.</p>
<p>On March 26, an official tweet from the city reiterated that sentiment but added that there is still no evidence that sensitive data has been compromised.</p>
<blockquote class="twitter-tweet" data-lang="en">
<p dir="ltr" lang="en">GENERAL REMINDER: At this time, there is no evidence to show that customer or employee data has been compromised. However, customers and employees are encouraged to take precautionary measures to monitor and protect their personal information.</p>
<p>— City of Atlanta, GA (@Cityofatlanta) <a href="https://twitter.com/Cityofatlanta/status/978966933155573761?ref_src=twsrc%5Etfw">March 28, 2018</a></p></blockquote>
<p><script async src="https://platform.twitter.com/widgets.js" charset="utf-8"></script></p>
<p><strong>The city hasn&#8217;t identified the attacker, but media reports point to a familiar name.</strong></p>
<p>A <em>New York Times</em> article <a href="https://www.nytimes.com/2018/03/27/us/cyberattack-atlanta-ransomware.html?mtrref=www.google.com">has identified</a> the SamSam hacking crew as the responsible party. While few details are known about SamSam, they do have several trademarks.</p>
<p>The group tends to target large organizations who have the resources to pay a hefty ransom. SamSam also has sophisticated methods of covering their tracks that allow them to attack organizations repeatedly.</p>
<p><strong>The same group victimized the Colorado Department of Transportation twice this year.</strong></p>
<p>The <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">first attack</a> shut down over 2,000 employee computers, forcing workers to use pen and paper to complete work. The city decided not to pay the ransom, but to painstakingly clean the computers of any malware.</p>
<p>When the city&#8217;s IT professionals had cleared 20 percent of computers for employee use, a variant of <a href="https://www.denverpost.com/2018/03/01/cdot-samsam-ransomware-attack/">SamSam reinfected them</a>. Hearing stories like these, it&#8217;s easy to understand why some organizations simply pay the ransom.</p>
<p>To put even more pressure on victims, the SamSam attackers generally target health care facilities and municipal organizations. <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a> all fell prey to SamSam ransomware in the last year.</p>
<p><strong>Atlanta is now learning a painful but useful lesson in cybersecurity.</strong></p>
<p>The city is documenting its progress and answering frequently asked questions on <a href="https://www.atlantaga.gov/government/ransomware-cyberattack-information">its website</a>, while the mayor promises that more attention will be given to cybersecurity in the future.</p>
<p>&#8220;Just as much as we really focus on our physical infrastructure, we need to focus on the security of our digital infrastructure,&#8221; <a href="https://www.cnn.com/2018/03/27/us/atlanta-ransomware-computers/index.html">Bottoms said</a>. &#8220;I am looking forward to us really being a national model of how cities can shore themselves up and be stronger because of it.&#8221;</p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/city-atlanta-hit-samsam-ransomware/">City of Atlanta Hit by SamSam Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Only Half of Ransomware Payments Resulted in Decrypted Files</title>
		<link>https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 21 Mar 2018 20:49:43 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5734</guid>

					<description><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive...</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive to confront and adapt to new security challenges in 2018.</p>
<p><strong>The report came from CyberEdge, who surveyed 1,200 IT security professionals and is not affiliated with any security vendor.</strong></p>
<p><img loading="lazy" decoding="async" class="alignright size-medium wp-image-5746" src="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png" alt="Cyberthreat Defense Report 2018 by Cyberedge" width="300" height="267" srcset="https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2-300x267.png 300w, https://datarecovery.com/wp-content/uploads/2018/03/cyberthreat-defense-report-2018-by-cyberedge2.png 327w" sizes="auto, (max-width: 300px) 100vw, 300px" />Their <a href="https://cyber-edge.com/wp-content/uploads/2018/03/CyberEdge-2018-CDR.pdf">2018 Cyberthreat Defense Report</a> is an attempt to understand the variety of threats faced by organizations that employ at least 500 people. The results showed that cyberattacks have become increasingly successful over the past five years (though, mercifully, the number of successful attacks is slightly down from last year).</p>
<p>Another illuminating trend is that the percentage of IT professionals who are optimistic about dodging successful attacks in the coming year went from 62 percent in 2014 to 38 percent in 2018. This can be viewed as pessimism or realism, but either way, it&#8217;s an acknowledgement of the great challenges ahead. Respondents listed application containers (like Docker or Rocket), mobile devices, and cloud infrastructure as the weakest links likely to be targeted by a cyberattack.</p>
<p><strong>Malware (viruses, worms, trojans) was voted as the number one general threat to IT security for the second year in a row.</strong></p>
<p>Second place was a tie between ransomware and phishing attacks. Given that many ransomware attacks were paired with worms and other malware (as well as phishing attacks), you can understand how big of a concern ransomware is for security professionals.</p>
<p>And it was not a rare phenomenon either. A surprising 55 percent of surveyed organizations were hit by ransomware in 2017. One area of good news was that many who refused to pay ransoms still recovered their data. Instead of buckling to cybercriminals, they worked to recover data from backups or simply dealt with the data loss. Almost 87 percent of victims who did not pay the ransom recovered their data anyway.</p>
<p>The scarier news was that only 49.6 percent of ransomware victims who paid the ransom were able to decrypt their data. This statistic should convince businesses and individuals of the importance of keeping current backups that are offline or in the cloud.</p>
<p>If a victim cannot recover backups, consulting a professional data recovery company is highly recommended. At Datarecovery.com, the recovery rates for ransomware cases are far higher than those in the CyberEdge survey. Knowing the landscape and having experience help ensure a successful recovery from a ransomware attack. Some strains have freely available decryptors, while others have coding issues that prevent even the attacker from decrypting files. Knowing which avenues to pursue saves time and increases the odds of a successful recovery.</p>
<p><strong>Survey respondents listed &#8220;lack of skilled personnel&#8221; as the greatest barrier to defending against cyberthreats.</strong></p>
<p>In past surveys, &#8220;low security awareness among employees&#8221; has topped that list, but a skilled personnel shortage has slowly climbed the ranks over the past five years. Poor security awareness still placed second as a barrier to IT security (which is concerning, given how long it&#8217;s been an issue).</p>
<p>Overall, the survey showed positive as well as negative trends. Many perennial threats remain: mobile devices and poorly trained employees continue to be security challenges. On the other hand, the number of successful cyberattacks decreased for the first time in five years and security budgets are higher than they&#8217;ve ever been. More than anything, the CyberEdge report reminds us that good IT security requires constant vigilance and adaptation to new threats.</p>
<p>The post <a href="https://datarecovery.com/rd/half-ransomware-payments-resulted-decrypted-files/">Only Half of Ransomware Payments Resulted in Decrypted Files</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SamSam Ransomware Infects CDOT</title>
		<link>https://datarecovery.com/rd/samsam-ransomware-infects-cdot/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 19 Mar 2018 16:17:14 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[Services]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[virus]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5719</guid>

					<description><![CDATA[<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back...</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="size-full wp-image-5728 aligncenter" src="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png" alt="CDOT logo" width="693" height="190" srcset="https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5.png 693w, https://datarecovery.com/wp-content/uploads/2018/03/CDOT-logo-5-300x82.png 300w" sizes="auto, (max-width: 693px) 100vw, 693px" /></p>
<p>SamSam ransomware has infected thousands of computers at the Colorado Department of Transportation. <a href="https://www.denverpost.com/2018/02/21/samsam-virus-ransomware-cdot/">Over 2,000 employee computers</a> were shut down to stop the spread of the malware after it was discovered on Feb. 21, and systems are still not back online.</p>
<p>Office of Information Technology chief technology officer David McCurdy released a statement shortly after the attack that said, “This ransomware virus was a variant and the state worked with its antivirus software provider to implement a fix today. The state has robust backup and security tools and has no intention of paying ransomware. Teams will continue to monitor the situation closely and will be working into the night.”</p>
<p><strong>SamSam is a strain of ransomware that targeted hospitals and others throughout January.</strong></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-5726 alignright" src="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png" alt="SamSam ransomware skull-and-crossbones" width="360" height="240" srcset="https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05.png 360w, https://datarecovery.com/wp-content/uploads/2018/03/samsam-ransomware-graphic05-300x200.png 300w" sizes="auto, (max-width: 360px) 100vw, 360px" /></p>
<p>An Indiana hospital, Hancock Health, <a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">paid a $55,000 ransom</a> to restore files and functionality after SamSam infected its servers. Even though the hospital claimed to have complete backups of encrypted files, administrators chose to pay the ransom to avoid costly delays in restoring their systems.</p>
<p><a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-colorado-dot-agency-shuts-down-2-000-computers/">Security researchers</a> say that the group behind SamSam uses a brute-force attack on Remote Desktop Protocol (RDP) connections to gain access to internal networks. Then, hackers manually install the ransomware, which begins encrypting files. To protect against SamSam, <a href="https://www.bleepingcomputer.com/news/security/samsam-ransomware-hits-hospitals-city-councils-ics-firms/">researchers warn</a> that any computers open to remote RDP connections should have strong and unique passwords.</p>
<p>SamSam was also the culprit behind attacks on <a href="https://www.scmagazine.com/samsam-ransomware-continues-to-wreak-havoc-on-infrastructure/article/738983/">Allscripts</a>, <a href="http://wane.com/2018/01/18/ransomware-attack-targets-adams-memorial-hospital/">Adams Memorial Hospital</a>, <a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/">Erie County Medical Center</a>, and the city of <a href="http://www.daily-times.com/story/news/local/farmington/2018/01/18/farmington-recovering-after-ransomware-attack/1044845001/">Farmington, New Mexico</a>. <a href="https://blog.barkly.com/samsam-ransomware-2018-campaign-hospital-attacks">Security experts</a> believe that these attacks were carried out by a single group of hackers.</p>
<p><strong>CDOT continues with daily work the old-fashioned way.</strong></p>
<p>“Our critical systems, our road operations, traffic operation systems are still online. We still have people on the road plowing and doing construction,” CDOT spokesperson Amy Ford <a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/">told the </a><a href="https://www.denverpost.com/2018/02/26/samsam-ransomware-virus-cdot/"><em>Denver Post</em></a>. “The things we have changed a little bit is we’ve had some business bids in the process of being done and we’ve extended times and dates. And we’re working with our contractors.”</p>
<p>The incident demonstrates the difficulties of recovering from a ransomware attack. Even though CDOT backed up their data, they are beginning their second week offline. Mecklenburg County, North Carolina <a href="http://www.charlotteobserver.com/news/local/article188302469.html">faced a similar slog</a> after a ransomware called LockCrypt infected county government servers. Officials spent well over a month <a href="https://www.mecknc.gov/news/Pages/Countywide-system-outage.aspx">scrambling to restore services</a> after that incident.</p>
<p>Ford summarized the frustrating but manageable limbo that CDOT is currently in.</p>
<p>“No one is back online. What we’re doing is working offline. All our critical services are still online — cameras, variable message boards, CoTrip, alerts on traffic. They are running on separate systems,” Ford said. “The message I’m sharing is CDOT operated for a long time without computers, so we’ll use pen and paper.”</p>
<p>The post <a href="https://datarecovery.com/rd/samsam-ransomware-infects-cdot/">SamSam Ransomware Infects CDOT</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>US and Britain Blame Russian Military for NotPetya</title>
		<link>https://datarecovery.com/rd/us-britain-blame-russia/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Tue, 20 Feb 2018 20:27:11 +0000</pubDate>
				<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5705</guid>

					<description><![CDATA[<p>British and US officials <a href="https://www.theguardian.com/technology/2018/feb/15/uk-blames-russia-notpetya-cyber-attack-ukraine">publicly blamed Russia</a> for the <a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/">NotPetya ransomware attack</a> that occurred on June 27, 2017. Ukrainian organizations, including the state power company and Kiev&#8217;s main airport, were among the first to report being affected, and approximately <a href="http://www.bbc.com/news/technology-40428967">80 </a>...</p>
<p>The post <a href="https://datarecovery.com/rd/us-britain-blame-russia/">US and Britain Blame Russian Military for NotPetya</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">British and US officials </span><a href="https://www.theguardian.com/technology/2018/feb/15/uk-blames-russia-notpetya-cyber-attack-ukraine"><span style="font-weight: 400;">publicly blamed Russia</span></a><span style="font-weight: 400;"> for the </span><a href="https://datarecovery.com/rd/petya-ransomware-infection-decryption-services/"><span style="font-weight: 400;">NotPetya ransomware attack</span></a><span style="font-weight: 400;"> that occurred on June 27, 2017. Ukrainian organizations, including the state power company and Kiev&#8217;s main airport, were among the first to report being affected, and approximately </span><a href="http://www.bbc.com/news/technology-40428967"><span style="font-weight: 400;">80 percent of the infections</span></a><span style="font-weight: 400;"> from the global attack occurred in Ukraine. Though dozens of non-Ukrainian companies were eventually affected, Ukraine was clearly at the epicenter.</span></p>
<p><span style="font-weight: 400;">Ukrainian </span><a href="https://www.reuters.com/article/us-cyber-attack-ukraine-backdoor/ukraine-scrambles-to-contain-new-cyber-threat-after-notpetya-attack-idUSKBN19Q14P"><span style="font-weight: 400;">politicians have long blamed</span></a><span style="font-weight: 400;"> Russia for the attacks, but it wasn&#8217;t until last month that </span><a href="https://www.washingtonpost.com/world/national-security/russian-military-was-behind-notpetya-cyberattack-in-ukraine-cia-concludes/2018/01/12/048d8506-f7ca-11e7-b34a-b85626af34ef_story.html?utm_term=.0821a34d1379"><span style="font-weight: 400;">the CIA concluded</span></a><span style="font-weight: 400;"> with &#8220;high confidence&#8221; that Russia&#8217;s GRU military spy agency created the malware.</span></p>
<p><span style="font-weight: 400;">Starting on Feb. 15, British, American, and Australian government agencies publicly accused Russia of the attack. British Foreign Office Minister Tariq Ahmad </span><a href="https://www.gov.uk/government/news/foreign-office-min%E2%80%A6"><span style="font-weight: 400;">released the first statement</span></a><span style="font-weight: 400;">, which said, &#8220;The attack masqueraded as a criminal enterprise but its purpose was principally to disrupt. Primary targets were Ukrainian financial, energy and government sectors. Its indiscriminate design caused it to spread further, affecting other European and Russian business.&#8221;</span></p>
<p><span style="font-weight: 400;">White House Press Secretary Sarah Sanders then </span><a href="https://www.whitehouse.gov/briefings-statements/statement-press-secretary-25/"><span style="font-weight: 400;">released her own statement</span></a><span style="font-weight: 400;">. &#8220;</span><span style="font-weight: 400;">In June 2017, the Russian military launched the most destructive and costly cyber-attack in history,&#8221; Sanders said. &#8220;This was also a reckless and indiscriminate cyber-attack that will be met with international consequences.&#8221;</span></p>
<h2>Russia responded with a shrug and a denial.</h2>
<p><span style="font-weight: 400;">&#8220;It&#8217;s not more than a continuation of the Russophobic campaign,&#8221; Kremlin spokesman Dmitry Peskov </span><a href="http://www.bbc.com/news/uk-politics-43062113"><span style="font-weight: 400;">told the BBC</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Australia quickly joined the US and UK in blaming Russia. The </span><a href="http://minister.homeaffairs.gov.au/angustaylor/Pages/notpetya-russia.aspx"><span style="font-weight: 400;">Minister for Law Enforcement and Cyber Security wrote</span></a><span style="font-weight: 400;">, &#8220;Based on advice from Australian intelligence agencies, and through consultation with the United States and United Kingdom, the Australian Government has judged that Russian state sponsored actors were responsible for the incident.&#8221;</span></p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-5708" src="https://datarecovery.com/wp-content/uploads/2018/02/Screen-Shot-2018-02-20-at-2.24.19-PM.png" alt="" width="324" height="101" /></p>
<p><span style="font-weight: 400;">While many security experts already blamed Russia for NotPetya, there were some calls to produce hard evidence. The Centre for Research on Globalization (CRG), a research and media organization based in Montreal, </span><a href="https://www.globalresearch.ca/us-uk-accuse-russia-of-notpetya-cyberattack-offer-zero-evidence/5629705"><span style="font-weight: 400;">points out that the accusers</span></a><span style="font-weight: 400;"> have shown no proof that Russia is responsible. Furthermore, CRG believes the CIA has the capability to leave fake &#8220;fingerprints&#8221; after a hack, meaning that, hypothetically, the US government could have carried out the attack itself.</span></p>
<p><span style="font-weight: 400;">According to CRG, the motivation for the CIA to carry out and then falsely accuse Russia for the attack would be to create a pretense for starting a war. Given how drastically the Trump administration has downplayed Russian meddling in the US elections, this scenario seems unlikely. Still, asking for more than circumstantial evidence before condemning Russia seems reasonable.</span></p>
<h2>The US government hinted at countermeasures to punish Russia.</h2>
<p><span style="font-weight: 400;">&#8220;We&#8217;re going to work on the international stage to impose consequences,&#8221; White House cybersecurity coordinator Rob Joyce </span><a href="https://www.cnbc.com/2018/02/16/us-will-impose-costs-on-russia-for-cyber-aggression-says-cybersecurity-czar.html"><span style="font-weight: 400;">told CNBC</span></a><span style="font-weight: 400;">. &#8220;We&#8217;re going to see levers the US government can do to impose those costs.&#8221; Joyce went on to condemn the &#8220;indiscriminate attack&#8221; that caused billions of dollars in damages.</span></p>
<p><span style="font-weight: 400;">Everyone with an interest in geopolitics is waiting to see what the US response will look like. Because the US has condemned the indiscriminate nature of the NotPetya attack, the countermeasures will likely be more targeted. However, considering the high costs NotPetya caused companies throughout Europe and the US, the response will not be light.</span></p>
<p>The post <a href="https://datarecovery.com/rd/us-britain-blame-russia/">US and Britain Blame Russian Military for NotPetya</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Malware Report Sheds Light on Underreported Cybercrimes</title>
		<link>https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Wed, 07 Feb 2018 22:24:06 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5688</guid>

					<description><![CDATA[<p>A New York Times <a href="https://www.nytimes.com/2018/02/05/nyregion/cyber-crimes-unreported.html?hp&#38;action=click&#38;pgtype=Homepage&#38;clickSource=story-heading&#38;module=second-column-region&#38;region=top-news&#38;WT.nav=top-news">report</a> revealed that law enforcement investigating cybercrimes can face many challenges including incomplete data, outdated statistical categories, and a lack of funding for cyber divisions. These problems hinder the solving of not just digital crimes, but...</p>
<p>The post <a href="https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/">Malware Report Sheds Light on Underreported Cybercrimes</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5690" src="https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03.jpg" alt="cybercrime malware report" width="800" height="558" srcset="https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03.jpg 800w, https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03-300x209.jpg 300w, https://datarecovery.com/wp-content/uploads/2018/02/cybercrime-malware-report03-768x536.jpg 768w" sizes="auto, (max-width: 800px) 100vw, 800px" />A <em>New York Times</em> <a href="https://www.nytimes.com/2018/02/05/nyregion/cyber-crimes-unreported.html?hp&amp;action=click&amp;pgtype=Homepage&amp;clickSource=story-heading&amp;module=second-column-region&amp;region=top-news&amp;WT.nav=top-news">report</a> revealed that law enforcement investigating cybercrimes can face many challenges including incomplete data, outdated statistical categories, and a lack of funding for cyber divisions. These problems hinder the solving of not just digital crimes, but of real-world crimes with a cyber aspect — such as illegal Fentanyl sales distributed through the dark web.</p>
<p>An illustrative example is the &#8220;cheating husband&#8221; scheme. Swindlers compose a message that threatens to expose a husband&#8217;s infidelities unless a ransom is paid. The scammers send the email to thousands of people, hoping to find a guilty and gullible victim among them. Unfortunately for the police, people who fall prey to these schemes rarely report the crime due to embarrassment. In this particular instance, one of the targets of the scheme contacted the Nashville Police Department.</p>
<p>However, even when victims report these crimes, local police departments don&#8217;t have a method of tracking or warning other jurisdictions about them. The FBI created the <a href="https://www.ic3.gov/default.aspx">Internet Crime Complaint Center</a> in 2000, but Donna Gregory, who heads the center, admitted only about 10 percent of cybercrimes are ever reported.</p>
<p>To make reporting easier and more uniform, the National Academies of Sciences, Engineering, and Medicine are currently working to modernize local and federal crime-classification systems. The hope is that with better data, local police departments and the FBI will be able to better address cybercrimes.</p>
<h2>Cybersecurity companies can offer greater insight into the world of internet crime.</h2>
<p>Law enforcement agencies may be overwhelmed by the breadth of digital crimes occurring, but IT security firms must stay ahead of hackers to remain in business. Their daily interactions in detecting and stopping attacks leaves them with a trove of valuable data.</p>
<p>Malwarebytes recently released their <a href="https://blog.malwarebytes.com/malwarebytes-news/2018/01/presenting-malwarebytes-labs-2017-state-of-malware-report/">2017 fourth quarter report</a> on the evolving tactics and techniques of hackers. The report detailed shifting but unrelenting threats from cybercriminals. For instance, after the <a href="https://datarecovery.com/rd/2017-ransomware-recap/">major ransomware attacks</a> last year, development and distribution of that particular type of malware slowed. In its place, attackers deployed spyware, banking trojans, and hijackers — all of which are designed to steal sensitive data and distribute more malware.</p>
<h2>Mining has increased as cryptocurrency grows in popularity and value.</h2>
<p>Bitcoin and a multitude of newer digital currencies have received increasing media attention as their prices skyrocketed and then crashed. While the cryptocurrency market has lost about half of its value since mid-December, many investors see this as a simple correction due to overzealous buyers late last year. Cryptocurrency is here to stay, and there is money to be made from it.</p>
<p>Of course, that means cybercriminals are getting in on the game. Sophisticated hackers have found vulnerabilities in cryptocurrency code to steal vast sums of digital money. That&#8217;s what happened to Japan&#8217;s CoinCheck, which was taken for $534 million in a <a href="https://www.forbes.com/sites/adelsteinjake/2018/02/02/japanese-authorities-continue-investigation-into-534m-cryptocurrency-heist-raid-coincheck/#7dc2a62f1836">late-January heist</a>.</p>
<p>However, there&#8217;s a more mundane way of making cryptocash that&#8217;s on the rise — mining. Cryptomining occurs when people volunteer computing power to a cryptocurrency&#8217;s network. In exchange for running software that validates transactions, miners occasionally earn coins. Hackers have invented a method called drive-by mining to receive the rewards of cryptomining while using unwilling victims to provide the computing power.</p>
<p>These drive-by mining programs can run on a computer without the victim ever knowing it (except for seeing a decrease in computer speed). Malwarebytes claims to have blocked over 100 million drive-by mining attempts in a single month, which means this is a major new threat for security firms.</p>
<h2>The report&#8217;s 2018 predictions indicate that consumers and businesses must remain vigilant.</h2>
<p>Malwarebytes believes that drive-by cryptocurrency mining will continue as long as digital currencies keep their value. The security firm also warns that hackers could use the Internet of Things to mine cryptocurrency as well as perpetrate DDOS attacks. Finally, the report&#8217;s authors believe the use of leaked exploit codes in 2017 will continue this year unless the governments who discover the vulnerabilities begin disclosing them.</p>
<p>The ever-shifting tactics of hackers shows how hard of a job the National Academies of Sciences, Engineering, and Medicine have in codifying a classification system for cyber-attacks. However, without recording and sharing this information in a formalized way, law enforcement will continue struggling to keep up with cybercriminals.</p>
<p>The post <a href="https://datarecovery.com/rd/malware-report-sheds-light-underreported-cybercrimes/">Malware Report Sheds Light on Underreported Cybercrimes</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</title>
		<link>https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Thu, 25 Jan 2018 17:32:55 +0000</pubDate>
				<category><![CDATA[Ransomware Recovery]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5672</guid>

					<description><![CDATA[<p>Cybercriminals are embracing alternative cryptocurrencies due to a multitude of concerns over bitcoin. Bitcoin&#8217;s newfound popularity has led to booming and busting prices, higher transaction fees, and longer wait times to confirm transactions. Harder-to-trace and cheaper-to-use digital currencies such as...</p>
<p>The post <a href="https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/">Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Cybercriminals are embracing alternative cryptocurrencies due to a multitude of concerns over bitcoin. Bitcoin&#8217;s newfound popularity has led to booming and busting prices, higher transaction fees, and longer wait times to confirm transactions. Harder-to-trace and cheaper-to-use digital currencies such as monero have subsequently seen an increase in popularity.</span></p>
<h2>Bitcoin price fluctuations have made setting ransom demands difficult.</h2>
<div id="attachment_5673" style="width: 350px" class="wp-caption alignright"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-5673" class="wp-image-5673" src="https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart.jpeg" alt="Graph of bitcoin price fluctuation." width="340" height="170" srcset="https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart.jpeg 800w, https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart-300x150.jpeg 300w, https://datarecovery.com/wp-content/uploads/2018/01/coindesk-bpi-chart-768x384.jpeg 768w" sizes="auto, (max-width: 340px) 100vw, 340px" /><p id="caption-attachment-5673" class="wp-caption-text">The price of bitcoin has fluctuated wildly, spooking investors and frustrating cybercriminals.</p></div>
<p><span style="font-weight: 400;">In the past month, the </span><a href="https://www.coindesk.com/price/"><span style="font-weight: 400;">price of bitcoin</span></a><span style="font-weight: 400;"> has yo-yoed from $13,000 to $17,000 and then back down to $10,000. These fluctuations make it difficult for hackers to demand a precise ransom. In fact, the price of bitcoin has become so unreliable, </span><a href="https://www.theguardian.com/technology/2018/jan/18/bitcoin-fluctuations-ransomware-cybercrminals-malware-developers"><span style="font-weight: 400;">hackers are increasingly pricing their ransoms</span></a><span style="font-weight: 400;"> in US dollars (though the payments are still frequently requested in bitcoin).</span></p>
<p><span style="font-weight: 400;">And a fluctuating price isn&#8217;t the cryptocurrency&#8217;s only problem. </span><span style="font-weight: 400;">Gabriel Glusman, senior cyber intelligence analyst at Sixgill, </span><a href="http://www.zdnet.com/article/ransomware-why-the-crooks-are-ditching-bitcoin-and-where-they-are-going-next/"><span style="font-weight: 400;">told ZDNet</span></a><span style="font-weight: 400;">, &#8220;</span><span style="font-weight: 400;">the time it takes for transactions to confirm, the high volume, and the transaction fees makes it that anything that&#8217;s less than $200 isn&#8217;t worth paying in bitcoin.&#8221; </span><span style="font-weight: 400;">These problems have spurred hackers to look for alternate forms of payment.</span></p>
<h2>The takedown of dark websites AlphaBay and Hansa has cybercriminals worried about cryptocurrency anonymity.</h2>
<p><span style="font-weight: 400;">A joint effort by the U.S. Department of Justice and Europol </span><a href="http://www.zdnet.com/article/u-s-department-of-justice-europol-tout-alphabay-takedown-but-keenly-aware-challenges-remain/"><span style="font-weight: 400;">took down AlphaBay</span></a><span style="font-weight: 400;">, a website that hosted listings for illegal drugs, stolen and fraudulent documents, firearms, and other illicit products. Once the site was shuttered, criminals flocked to another dark website, Hansa.</span></p>
<p><span style="font-weight: 400;">Unfortunately for the criminals who created Hansa accounts, the site had already been seized by Dutch officials. International law enforcement agencies silently recorded the criminal activity taking place on Hansa. </span><span style="font-weight: 400;">&#8220;They flocked to Hansa in their droves,&#8221; </span><a href="https://www.wired.com/story/alphabay-hansa-takedown-dark-web-trap/"><span style="font-weight: 400;">Interpol director Rob Wainwright</span></a><span style="font-weight: 400;"> told </span><i><span style="font-weight: 400;">Wired</span></i><span style="font-weight: 400;">. &#8220;We recorded an eight-times increase in the number of new users on Hansa immediately following the takedown of AlphaBay.&#8221;</span></p>
<p><span style="font-weight: 400;">The closures of AlphaBay and Hansa have spooked some cybercriminals into seeking currencies with more privacy protections than bitcoin. Wainwright tweeted a warning that, &#8220;</span><span style="font-weight: 400;">We’ll see a progressive shift in 2018 towards criminal use of cryptocurrencies other than Bitcoin, making it generally more challenging for law enforcement to counter.&#8221;</span></p>
<h2>Monero has a growing share of the cryptocurrency market.</h2>
<p><span style="font-weight: 400;">The alt-coin launched in 2014 and focuses on being untraceable, which has made it popular for ransomware distributors. Matt Suiche, founder of Comae Technologies </span><a href="https://www.bloomberg.com/news/articles/2018-01-02/criminal-underworld-is-dropping-bitcoin-for-another-currency"><span style="font-weight: 400;">told Bloomberg</span></a><span style="font-weight: 400;"> that monero is now &#8220;one of the favorites, if not the favorite&#8221; cryptocurrency of ransomware attackers.<img loading="lazy" decoding="async" class="alignright wp-image-5675" src="https://datarecovery.com/wp-content/uploads/2018/01/logo.png" alt="Monero Cryptocurrency Logo" width="334" height="176" srcset="https://datarecovery.com/wp-content/uploads/2018/01/logo.png 1200w, https://datarecovery.com/wp-content/uploads/2018/01/logo-300x158.png 300w, https://datarecovery.com/wp-content/uploads/2018/01/logo-768x404.png 768w, https://datarecovery.com/wp-content/uploads/2018/01/logo-1024x539.png 1024w" sizes="auto, (max-width: 334px) 100vw, 334px" /> </span></p>
<p><span style="font-weight: 400;">Monero transaction fees (like those of bitcoin) are not fixed, but they have been <a href="https://bitinfocharts.com/comparison/transactionfees-btc-xmr.html#3m">significantly lower</a> than bitcoin&#8217;s on average.</span><span style="font-weight: 400;"> Monero also has </span><a href="https://www.monero.how/how-does-monero-privacy-work"><span style="font-weight: 400;">many more features</span></a><span style="font-weight: 400;"> to ensure anonymity than bitcoin (though some transactions from between 2014 and 2016 </span><a href="https://cointelegraph.com/news/monero-transactions-history-can-be-revealed-and-exposed-research"><span style="font-weight: 400;">may be traceable</span></a><span style="font-weight: 400;">). </span></p>
<p><span style="font-weight: 400;">While monero&#8217;s developers aren&#8217;t advocating for criminals to use it, they admit that it is well-suited for illegal transactions. Riccardo Spagni, a core developer for the alt-coin told Bloomberg, &#8220;I imagine that monero provides massive advantages for criminals over bitcoin, so they would use [it].&#8221;</span></p>
<h2>Another attractive currency for use on the dark web is Dash.</h2>
<p><span style="font-weight: 400;">The alt-coin, whose name is a portmanteau of &#8220;digital cash,&#8221; may have an even brighter future than monero. It has extremely low transaction fees (they aren&#8217;t fixed, but are generally less than $1) and an </span><a href="https://dashpay.atlassian.net/wiki/spaces/DOC/pages/1146928/InstantSend"><span style="font-weight: 400;">InstantSend function</span></a><span style="font-weight: 400;"> that completes transactions in as little as a few seconds. Dash also has a feature called PrivateSend that makes it attractive to those looking to do untraceable deals.</span></p>
<p><span style="font-weight: 400;">Dash received media attention after inking a deal with Kuvacash, a project aiming to stabilize Zimbabwe&#8217;s runaway inflation. The </span><a href="http://www.businessinsider.com/dash-price-new-high-november-22-reddit-rumours-2017-11"><span style="font-weight: 400;">$550,000 partnership</span></a><span style="font-weight: 400;"> led to a steady increase in the coin&#8217;s price until an abrupt nosedive with most other cryptocurrencies in mid-January. Still, if the coin achieves mainstream popularity, it will be very attractive to cybercriminals looking for a good blend of ease-of-use and increased privacy.</span></p>
<h2>Ransomware may embrace new currencies, but it&#8217;s not going away any time soon.</h2>
<p><a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/"><span style="font-weight: 400;">Hancock Health</span></a><span style="font-weight: 400;"> and </span><a href="https://www.csoonline.com/article/3250246/security/allscripts-recovering-from-ransomware-attack-that-has-kept-key-tools-offline.html"><span style="font-weight: 400;">Allscripts</span></a><span style="font-weight: 400;">, an electronic health record company, have both suffered costly ransomware attacks in January 2018. Last year saw </span><a href="https://datarecovery.com/rd/schools-non-profits-local-governments-medical-centers-hit-ransomware-2017/"><span style="font-weight: 400;">ransomware cripple dozens</span></a><span style="font-weight: 400;"> of organizations and businesses as IT departments scrambled to keep up. That is to say, bitcoin&#8217;s price may fluctuate, but ransomware attacks remain a constant.</span></p>
<p><span style="font-weight: 400;">Cybercriminals fleeing the bitcoin market does not necessarily mean that law-abiding consumers will, too. However, some of bitcoin&#8217;s issues, like hefty transaction fees and long confirmation times, extend to everyone who uses it. Other cryptocurrencies like monero and Zcash hope to capture a larger market share due to enhanced privacy features. </span></p>
<p><span style="font-weight: 400;">Whichever form wins out in the end, there is a demonstrated appetite for cryptocurrency — the current market cap stands at over $500 billion. Our only advice is that if you decide to invest in one of these new alt-coins, don&#8217;t choose </span><a href="https://blog.fortinet.com/2018/01/22/spritecoin-another-new-cryptocurrency-or-not"><span style="font-weight: 400;">SpriteCoin</span></a><span style="font-weight: 400;"> — it&#8217;s a disguised ransomware that will encrypt your files and demand 0.3 monero. </span></p>
<p>The post <a href="https://datarecovery.com/rd/cybercriminals-ditch-bitcoin-search-better-cryptocurrency/">Cybercriminals Ditch Bitcoin in Search of Better Cryptocurrency</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Indiana Hospital Pays $55,000 to Get Rid of Ransomware</title>
		<link>https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Wed, 24 Jan 2018 18:15:02 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5667</guid>

					<description><![CDATA[<p>On January 11, Hancock Health became the latest medical center to fall victim to a ransomware attack. The Greenfield, Indiana hospital says its files were backed up, but opted to pay the $55,000 ransom anyway to more quickly restore its...</p>
<p>The post <a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">Indiana Hospital Pays $55,000 to Get Rid of Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">On January 11, Hancock Health became the latest medical center to fall victim to a ransomware attack. The Greenfield, Indiana hospital says its files were backed up, but opted to pay the $55,000 ransom anyway to more quickly restore its systems.</span></p>
<h2>Hospital staff used paper and pencil while the computer system was evaluated.</h2>
<p><span style="font-weight: 400;">Hancock Health CEO, Steve Long, told the </span><a href="http://www.greenfieldreporter.com/2018/01/13/01132018dr_hancock_network_hack/"><i><span style="font-weight: 400;">Greenfield Daily Reporter</span></i></a><span style="font-weight: 400;"> that no appointments were canceled as a result of the attack (though snowy weather helped by causing cancellations and reducing patient volume). Many hospital patients didn&#8217;t even know there was an issue, and Long doesn&#8217;t think any sensitive information was compromised in the attack.</span></p>
<p><span style="font-weight: 400;">According to a </span><a href="http://wishtv.com/2018/01/16/hancock-regional-hospital-hit-by-ransomware-attack-pays-ransom/"><span style="font-weight: 400;">Fox affiliate WISH</span></a><span style="font-weight: 400;">, SamSam is the ransomware that infected Hancock Health. After encrypting files, the malware displayed a a ransom note that demanded four bitcoins (which was approximately $55,000 at the time of payment).</span></p>
<p><span style="font-weight: 400;">&#8220;We wanted to recover our systems in the quickest way possible and avoid extending the burden toward other hospitals of diverting patients,&#8221; Long told WISH. “Restoring from backup was considered, though we made the deliberate decision to pay the ransom to expedite our return to full operations.”</span></p>
<h2>SamSam targets vulnerabilities in servers and requires no interaction on the victim&#8217;s part.</h2>
<p><span style="font-weight: 400;">Many ransomware attacks are the result of incautious employees clicking on malicious links or attachments in emails. SamSam instead </span><a href="http://www.zdnet.com/article/samsam-ransomware-now-demands-33000-from-victims/"><span style="font-weight: 400;">searches for vulnerabilities</span></a><span style="font-weight: 400;"> on servers that have not been properly configured or updated.</span></p>
<p><span style="font-weight: 400;">According to an FBI statement, SamSam has successfully targeted healthcare facilities in the past. One noteworthy case is that of </span><a href="https://www.cbsnews.com/news/cbsn-on-assignment-hackers-targeting-medical-industry-hospitals/"><span style="font-weight: 400;">Erie County Medical Center (ECMC)</span></a><span style="font-weight: 400;"> in Buffalo, New York. After being infected by SamSam, the hospital decided not to pay the ransom. ECMC had backups and administrators doubted that the hackers would restore files even after being paid. Staff used workarounds and non-electronic processes for over a month before all functionality was restored.</span></p>
<p><span style="font-weight: 400;">&#8220;Our people were tested, and it blew me away. They have been resourceful, and have rallied around each other and the patients,&#8221; ECMC CEO Thomas Quatroche told </span><a href="http://buffalonews.com/2017/05/20/ecmc-got-hacked-cyber-extortionists/"><i><span style="font-weight: 400;">The Buffalo News</span></i></a><span style="font-weight: 400;">. &#8220;There also was a silver lining in that we learned that having administrators do rounding through the hospital is something we need to do more of in the future.&#8221;</span></p>
<p><span style="font-weight: 400;">While Quatroche keeps his perspective positive, the ransomware did a great deal of financial damage. </span><a href="http://wivb.com/2017/07/26/ecmc-spends-millions-to-recover-from-ransomware-attack/"><span style="font-weight: 400;">Officials estimate</span></a><span style="font-weight: 400;"> that the attack cost $10 million. Overtime and lost business made up some of the losses, but much of the money went toward beefing up hardware and software to ensure a ransomware attack never succeeds again.</span></p>
<h2>Whether victims pay a ransom or not, the FBI encourages them to report cyberattacks.</h2>
<p><span style="font-weight: 400;">Businesses affected by ransomware should report the incident to the </span><a href="https://www.ic3.gov/default.aspx"><span style="font-weight: 400;">Internet Crime Complaint Center</span></a><span style="font-weight: 400;">. By tracking attacks and tactics, the FBI has a better chance of catching hackers and helping businesses avoid infections.<img loading="lazy" decoding="async" class=" wp-image-5669 alignright" src="https://datarecovery.com/wp-content/uploads/2018/01/Internet-Crime-Complaint-Center.jpeg" alt="" width="463" height="132" srcset="https://datarecovery.com/wp-content/uploads/2018/01/Internet-Crime-Complaint-Center.jpeg 768w, https://datarecovery.com/wp-content/uploads/2018/01/Internet-Crime-Complaint-Center-300x86.jpeg 300w" sizes="auto, (max-width: 463px) 100vw, 463px" /> </span></p>
<p><span style="font-weight: 400;">There were almost 3,000 reported complaints about ransomware in 2016 and because </span><a href="https://pdf.ic3.gov/2016_IC3Report.pdf"><span style="font-weight: 400;">fraud is severely underreported</span></a><span style="font-weight: 400;">, the actual number of attacks is likely much higher. The attack on Hancock Health proves that medical centers remain an attractive target to cybercriminals. Hospital administrators should take measures to </span><a href="http://www.healthcarebusinesstech.com/ransomware-patient-info/"><span style="font-weight: 400;">improve their IT security</span></a><span style="font-weight: 400;"> and consider buying cyber insurance.</span></p>
<p>The post <a href="https://datarecovery.com/rd/indiana-hospital-pays-55000-get-rid-ransomware/">Indiana Hospital Pays $55,000 to Get Rid of Ransomware</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Still a Major Issue for the Internet of Things</title>
		<link>https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 11 Jan 2018 22:46:50 +0000</pubDate>
				<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[cybercrime]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=5651</guid>

					<description><![CDATA[<p>Early last year, <a href="https://datarecovery.com/rd/ransomware-2017-expectations/">we warned that the Internet of Things</a> (IoT) had major security vulnerabilities, and it was a matter of time until hackers targeted it. And while smart devices have largely evaded ransomware attacks (though <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/#17d14ca4425c">some IoT devices</a> were...</p>
<p>The post <a href="https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/">Cybersecurity Still a Major Issue for the Internet of Things</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Early last year, <a href="https://datarecovery.com/rd/ransomware-2017-expectations/">we warned that the Internet of Things</a> (IoT) had major security vulnerabilities, and it was a matter of time until hackers targeted it. And while smart devices have largely evaded ransomware attacks (though <a href="https://www.forbes.com/sites/thomasbrewster/2017/05/17/wannacry-ransomware-hit-real-medical-devices/#17d14ca4425c">some IoT devices</a> were hit as collateral damage in the WannaCry attack in May), it&#8217;s not because of improved security. More likely, it&#8217;s because hackers haven&#8217;t figured out how to make it profitable yet. Unfortunately, that may not be the case for long.</p>
<h2>What is the Internet of Things?</h2>
<p>The IoT refers to devices — think appliances, cars, and HVAC systems — that connect to the internet. These devices often have &#8220;smart&#8221; as a prefix and offer convenient and futuristic features like the ability to turn up the heat or AC just before you head home from work.</p>
<p>Smart watches, which display emails, monitor heart rate, and even tell golfers how far they are from the pin, are one of the most popular IoT gadgets. But there plenty of lesser known smart devices as well. Coffee makers, thermostats, and light bulbs are increasingly offering connectivity to the internet as a feature.</p>
<p>Unfortunately, the connectivity that allows consumers to control appliances remotely also exposes devices to malware. And that brings us to the crux of why the IoT will likely become a more frequent target of ransomware attacks.</p>
<h2>IoT continues growing, but security is still lax.</h2>
<p>The IoT has grown in fits and starts through 2017. For the <a href="http://www.zdnet.com/article/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time/">first time in history</a>, there are more connected devices (approximately 8.4 billion) than humans (approximately 7.6 billion) on the planet. That being said, <a href="http://www.zdnet.com/article/cisco-most-iot-projects-are-failing-due-to-lack-of-experience-and-security/">Cisco estimates that 75 percent</a> of all IoT projects are failing due to problems with security and lack of compatibility.</p>
<p>These security issues will become a major issue as consumers and industry grow accustomed to the benefits of connectivity. The more people rely on connected devices, the more vulnerable to ransomware they become. After all, successful ransomware attacks depend on the victim feeling like they have no choice but to pay the ransom.</p>
<h2>IoT ransomware would look different than the attacks we&#8217;ve seen lately.</h2>
<p>In general, smart devices are highly specialized and quite different from desktop computers. They don&#8217;t store family photos or business files, and many don&#8217;t have a screen to display a ransom note. Still, enterprising hackers could find a way to freeze or take control of devices and demand a payment.</p>
<p>At the Def Con hacking conference, two researchers demonstrated how they could <a href="https://www.iotsecurityfoundation.org/the-iot-ransomware-threat-is-more-serious-than-you-think/">infect a thermostat</a> with ransomware. If hackers targeted a hospital or nursing home and cranked the heat during summer or AC during winter, victims would have to consider paying the ransom.</p>
<p>If hackers successfully targeted even more critical equipment in a medical facility, the stakes would be even higher. <a href="http://www.computerweekly.com/news/450400567/Poor-IoT-security-could-take-down-power-grid-warns-researcher">Several researchers</a> have warned that U.S. <a href="https://www.cfr.org/report/cyberattack-us-power-grid">power grids are vulnerable</a> due to poor IoT security. These are some of the reasons why <a href="https://techcrunch.com/2015/10/24/why-iot-security-is-so-critical/">so many people</a> are <a href="https://www.techadvisor.co.uk/feature/security/iot-gets-more-more-attractive-ransomware-3665400/">urging IoT manufacturers</a> to take security more seriously.</p>
<h2>Consumers can take precautions right now to protect IoT devices.</h2>
<p>For starters, don&#8217;t keep the default password and don&#8217;t make the new one &#8220;123456&#8221; or something else that is easy to guess. Always update your smart devices when a patch becomes available (just like you should with your computer and phone).</p>
<p>Consumers should make sure devices are operating on a secured Wi-Fi router and not an open wireless connection. Buying devices from companies that have a good cybersecurity track record is also helpful. Here&#8217;s <a href="https://www.ic3.gov/media/2015/150910.aspx">more information from the FBI</a> on how to protect your devices from hacking. As for industrial and government systems, we hope they listen to Cisco CTO Kevin Bloch <a href="https://www.rfglobalnet.com/doc/success-and-peril-as-the-internet-of-things-haul-trillions-into-global-economy-0001">when he says</a>, &#8220;If you don&#8217;t secure it, don&#8217;t connect it.&#8221;</p>
<p>The post <a href="https://datarecovery.com/rd/cybersecurity-still-major-issue-internet-things/">Cybersecurity Still a Major Issue for the Internet of Things</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 120/182 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-02 23:01:20 by W3 Total Cache
-->