There’s a new Ransomwhere and we’d like to give you the heads up.
– New Ransomware, named BadRabbit
– 3rd major malware spread, this year, after WannaCry and NotPetya
– Infection via compromised websites
– Malware is disguised as Adobe Flash installer in encrypts hard drives (using DiskCryptor)
– Ransom is US$280 in Bitcoin
– Many similarities to NotPetya
WHAT TO DO:
- Software Patching
- Automate your patching and cover as many vendors as possible.
- Email Security
- Employ email security to scan inbound URLs (web addresses). This technology keeps you safe regardless of the device or location, from which you access emails, and click on any links.
- Web Security
- Configure your perimeter security, to analyse your web traffic in real time. If you accidentally visit a nefarious website, this technology will detect, and drop, and malicious payloads. A well configured firewall, will also prevent your machine from ‘calling home’ back out to the internet, should you somehow get infected.
- Have a robust, and well tested, backup process. If the worst happens and you are ‘ransomwared’, you can simply recover your data from a backup. Still painful, but much less costly!
- Human Firewall
- Train yourself and your colleagues, your biggest asset, to spot threats and avoid traps. The Bar Council and the ICO tell us we should all complete annual awareness training and GDPR is just around the corner
Latest posts by Anna Adamovics (see all)
- AI (Artificial Intelligence) for the legal industry - January 15, 2018
- AI (Artificial Intelligence) for the legal industry - January 11, 2018
- The benefits of having your own Virtual IT Director - December 8, 2017