[vc_row type=”in_container” full_screen_row_position=”middle” scene_position=”center” text_color=”dark” text_align=”left” overlay_strength=”0.3″][vc_column column_padding=”no-extra-padding” column_padding_position=”all” background_color_opacity=”1″ background_hover_color_opacity=”1″ width=”2/3″ tablet_text_alignment=”default” phone_text_alignment=”default”]
More than 60 Ransomware families that were active in 2016, security firm Kaspersky Lab says 47 of these strains contained codes that allowed attribution to Russian-speaking criminals. This means that 75% of all ransomware families active over the past year were developed by a Russian-speaking developer or programmer, most likely hiding in one of the former Soviet states.
The tracks included fragments of source code, C & C server URLs, ads in underground forums and so on.
The proliferation of ransomware cybercrime operations in Russia was also aided by the myth that the Russian authority will go after Russian hackers if they do not attack Russian users.
Therefore, in most cases, you will see variants of ransomware that will be denied to execute if the local keyboard or the language configuration are established in Russian or for other neighboring countries, former members of the USSR.
According to the telemetry registered by the security products of Kaspersky Lab, ransomware has grown enormously in the last year. The Russian antivirus maker says that the frequency of ransomware attacks has intensified over the past year from one to every 20s to one to 10s by the end of the year, with affected businesses being every 35s.
Experts noted a recent trend of ransomware authors moving away from the classic mass spam from random users to attacks targeting high-value companies because they can pay good sums for the hijacking of sensitive information. Such a ransomware gang is the group behind Crysis’s ransomware, which has recently been using RDP’s brute-force attacks to infect large organizations. In the last six months, the activity of this group has more than doubled, according to security firm Trend Micro.
What’s happening now is starting to appear the ransomware for gadgets, IoT and another stuff as door of hotel, probably Teslas Cars and so on, we will see what they can reach.
learn, learning, the best security practice, ethical hacking, IT, Admin, Administrator, Server, User, Kali Linux, Phone, Download, Blog, WordPress, Free, Lab, Pentest, Pentester