Introducing the Microsoft Teams Schedule Send Feature
read moreRansomware has caused such a furor in the world of business computing (and especially in certain industries), to the point that many organizations are sparing no expense in getting tip-top network security measures in place. There have been ransomware removal tools available designed for specific ransomware exploits, but now there’s a tool that will allow […]
Ransomware has caused such a furor in the world of business computing (and especially in certain industries), to the point that many organizations are sparing no expense in getting tip-top network security measures in place. There have been ransomware removal tools available designed for specific ransomware exploits, but now there’s a tool that will allow PC owners and business enterprisers to be able to run a simulation that tests how ransomware-ready their system/network is.
And, the attacks are getting more vicious with every variant to come down the pike. Graham Cluley was the first to report on a new Locky ransomware phishing attack where the emails claim to be “credit card suspended” and “suspicious money movement” warnings.
Cluley said: “In the last few days there have been a spate of spammed-out attacks using similar techniques to dupe unwary internet users into clicking on an attachment that will lead to their Windows PC being infected with the notorious Locky ransomware.”
This attack is now using threats claiming that there have been “suspicious movements” of funds out of your bank account and/or that your credit card account has been suspended. Here is an example of the suspicious money movement social engineering tactic:
Attached to the email is a ZIP file containing a malicious Javascript file (.JS), that, if the employee opens it, downloads the most recent version of the Locky ransomware from a remote server from one of five different URLs. Next, the ransomware is executed without any further user interaction. Some anti-virus products detect the malicious Javascript as Trojan.JS.Downloader.GXW, but that changes on a regular basis.
Here’s an example of the credit card suspension email:
The Locky cybercriminals are well-organized and highly automated. They change the names and contact details used in these phishing emails so you cannot rely on them being the same. Ransomware is cybercrime’s most successful business model, so count on these attacks increasing in the future.
It is highly recommended by IT security experts that you have your defense-in-depth fully in place, have weapons-grade backups, and step your users through new-school security awareness training which includes frequent simulated phishing attacks to keep them on their toes with security top of mind.
How to Get the Free Ransomware Simulator Tool
However vulnerable your network is to ransomware attacks, there is hope. Bad guys are constantly coming out with new versions of ransomware strains to evade detection, but there are also new tools to get rid of it. Is your network effective in blocking ransomware when employees fall for social engineering attacks?
KnowBe4’s Ransomware Simulator “RanSim” gives you a quick assessment of the effectiveness of your existing network protection. RanSim will simulate five ransomware infection scenarios and show you if a workstation is vulnerable to infection. The RanSim program works in the following ways:
Get a No-Hassle Network Security Evaluation
Sensible Systems, LLC. is a leader in providing responsive IT security tools and technology. Get a no-obligation evaluation of your computer network security now, by calling a friendly representative at (877) 773-6797, or by emailing us at {email} for more information.
Contact Us