Just In
- 3 hrs ago Best Noise-Cancelling Earbuds Under Rs 5,000: CMF Buds Pro, Redmi Buds 5, Realme Buds Air 5, and More
- 3 hrs ago How to Get Zomato Gold Membership Worth Rs 999 for Free
- 5 hrs ago Garena Free Fire Max Redeem Codes for April 20, 2024: Get Access to the Latest In-game Loot
- 5 hrs ago Apple Watch X Renders Surface: Magnetic Bands, Blood Pressure Tracking, and More
Don't Miss
- News Who Was Max Azzarello, The US 'Conspiracy Theorist' Who Set Himself On Fire Outside Donald Trump's Trial?
- Education Zerodha-backed firm offers jobs to UPSC aspirants who couldn't crack the exam
- Movies Do Aur Do Pyaar Box Office Collection Day 2 Prediction: Vidya-Pratik's Rom-Com To Cross 1 Cr On Saturday
- Sports IPL 2024: Gautam Gambhir Always Knew Sunil Narine Would Become A T20 Legend
- Finance Elon Musk Postpones India Trip, Tesla's Indian Market Entry Delayed
- Lifestyle Russian Influencer Starves His Newborn To Death With Sunlight Diet, Know Dos And Don’ts Of This Diet
- Automobiles Tesla CEO Elon Musk's Much-Awaited Visit to India Deferred, Leaving Questions Unanswered
- Travel Journey From Delhi To Ooty: Top Transport Options And Attractions
India is the most vulnerable to the SamSam Ransomware: report
SamSam ransomware has raked in almost $6 million.
A new report from Sophos says that since its first appearance in December 2015, the SamSam ransomware has raked in almost $6 million by targeting organisations and individuals around the world, including those in India. According to the 47-page report, 74 percent of the known victims are based in the United States. Other regions known to have suffered attacks include Canada, the U.K. and the Middle East, with India ranking sixth among the top victim countries across the world.
The cybersecurity firm also revealed in a separate survey that "90 percent of the businesses in India have been either hit or expected to be hit by ransomware," and it's expecting that Indian business will see an increase in cyber attacks in the near future. SamSam ransomware could be one of them.
One Is Not Like the Others:
Different from the traditional ransomware attacks, SamSam's thorough encryption renders not only personal and work data files unusable but also any program nonessential to Windows operation, most of which are not routinely backed up. Unlike nearly all other ransomware attacks, much of the attack process is manual.
Once inside a system, the attacker spread a payload laterally across the network; a sleeper cell awaits instructions to begin encrypting. The result of SamSam attacks is often that numerous victims are unable to recover adequately or quickly enough and decide to pay the ransom.
You Can't Secure What You Can't See:
While the infection method of the SamSam ransomware is still unclear, as always, cyber hygiene practices should be the first line of defense. Preventing an attack (or being able to respond and isolate it quickly) requires a strong security foundation that is built on the complete visibility of the network. This pervasive visibility gives IT teams the ability to quickly identify potential exposures and attack paths.
Skybox gives you that visibility by consolidating data from more than 120 networking and security technologies organizations have in use. The Skybox SecuritySuite uses this information to create a dynamic model of an attack surface, including physical, multi-cloud and OT networks where needed. The model provides context around all of the ingress/egress points and complexities of your network and assets, giving you a detailed understanding of what you're trying to defend.
- After building the model of your environment, Skybox will conduct a risk analysis to identify and prioritize weaknesses and vulnerabilities such as unprotected ingress/egress points, misconfigured network devices, firewalls with overly permissive rules, exposed assets, exploitable attack vectors, etc.
- Following the initial resilience assessment, the riskiest characteristics of the environment can be remediated to reduce risk quickly and in a demonstrable way - for example by addressing parts of the infrastructure for which there are no firewalls or where these are configured incorrectly; filling in vulnerability scanning blind spots; and recommending remediation and mitigation for high-risk vulnerabilities.
- Acting on this insight, your environment will immediately be more secure and resilient. If an attack or malware outbreak does occur, you'll have a greater context to contain the attack quickly and eliminate the attack vectors.
-
99,999
-
1,29,999
-
69,999
-
41,999
-
64,999
-
99,999
-
29,999
-
63,999
-
39,999
-
1,56,900
-
79,900
-
1,39,900
-
1,29,900
-
65,900
-
1,56,900
-
1,30,990
-
76,990
-
16,499
-
30,700
-
12,999
-
18,800
-
62,425
-
1,15,909
-
93,635
-
75,804
-
9,999
-
11,999
-
3,999
-
2,500
-
3,599