{"id":6448,"date":"2020-04-20T23:14:07","date_gmt":"2020-04-20T22:14:07","guid":{"rendered":"https:\/\/www.n-able.com\/?p=6448"},"modified":"2021-04-09T23:16:26","modified_gmt":"2021-04-09T22:16:26","slug":"trends-in-ransomware-staying-up-to-date","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date","title":{"rendered":"Trends in Ransomware: Staying Up-to-Date in the Fight"},"content":{"rendered":"<p>For the past several years, ransomware has been a major threat to both businesses and individual consumers. Even when cryptojacking became the threat\u00a0<i>du jour<\/i>\u00a0for a few months, ransomware remained alive and ready to make a resurgence.<\/p>\n<p>But no threat remains the same year in and year out. Defenses evolve, and with them, so do attackers\u2019 tactics. Today, let\u2019s talk about the latest ransomware trends and how you can help protect your customers.<\/p>\n<h3>The history of ransomware<\/h3>\n<p>Ransomware is an appealing method of financial gain for cybercriminals. Rather than having to steal data, find a buyer for it, and then sell it, they can simply lock a computer and force a victim to pay. This speeds up payment and reduces their risk of detection\u2014individual victims may not report the crime, and, if they do, police may not have the resources to investigate every instance. Plus, the rise of cryptocurrencies has allowed cybercriminals to maintain a level of anonymity with regard to payment.<\/p>\n<p>Attacks have become more ambitious. In 2013, CryptoLocker spread among end users across the world, and only a few years later that we saw shifts toward larger businesses and organizations. In 2017, we experienced the widespread WannaCry attacks, which devastated businesses and organizations worldwide, even disrupting the United Kingdom\u2019s\u00a0<a class=\"ext\" href=\"https:\/\/www.telegraph.co.uk\/technology\/2018\/10\/11\/wannacry-cyber-attack-cost-nhs-92m-19000-appointments-cancelled\/\" target=\"_blank\" rel=\"noopener noreferrer\">National Health Service<\/a>\u00a0for a period of time. Over the past few years, we\u2019ve seen more attacks target city governments. While some have attacked large cities\u00a0<a class=\"ext\" href=\"https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/\" target=\"_blank\" rel=\"noopener noreferrer\">like Atlanta<\/a>, many exploit\u00a0<a class=\"ext\" href=\"https:\/\/www.cbsnews.com\/news\/ransomware-attacks-on-the-rise-and-governments-are-in-the-crosshairs\/\" target=\"_blank\" rel=\"noopener noreferrer\">small city governments<\/a>\u00a0that often lack proper defensive resources.<\/p>\n<p>Beyond the choices of targets, cybercriminals have grown craftier in malware creation, delivery, and execution. As businesses have gotten better at defending, cybercriminals have adapted. Take, for example, the\u00a0<a class=\"ext\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/AA18-337A\" target=\"_blank\" rel=\"noopener noreferrer\">SamSam ransomware variant<\/a>, which begins by focusing on vulnerabilities within critical servers then uses that to gain persistence and propagate out to other endpoints and parts of the network.<\/p>\n<p>Plus, cybercriminals have attempted to use ransomware to increase the length and value of their attack. For example, the\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/maze-ransomware-threat-businesss-security-and-reputation\" target=\"_blank\" rel=\"noopener\">Maze ransomware attack<\/a>\u00a0from earlier this year added extortion as leverage to get victims to pay the ransom. Criminals had been threatening extortion for a while, but this was one of the first times they made good on the threat by publishing the information of organizations that refused to pay publicly. With increased reporting requirements under data privacy laws, criminals are betting that businesses will pay ransoms to avoid larger compliance fines (although, hopefully, businesses will follow their legal requirements instead).<\/p>\n<h3>What to do about it<\/h3>\n<p>Criminals have adapted their tactics to maximize their payday and chances of success. But that doesn\u2019t mean the IT industry hasn\u2019t kept pace. Here are a few tips for dealing with modern ransomware attacks:<\/p>\n<ul>\n<li><b>Assess risk:\u00a0<\/b>We frequently stress the importance of assessing risk. With modern ransomware, a risk-based approach still matters. This lets you best allocate your resources, and can also impress the importance of specific solutions on prospects or customers. For example, if you\u2019re working with government organizations, noting that they\u2019re the focal point for ransomware may help them take their defenses more seriously. Additionally, since criminals have moved away from the large-scale, spray-and-pray approach to ransomware, you\u2019ll want to spend your resources on the customers crown jewels, like servers and laptops with sensitive information. Protecting every device is ideal, but cost-conscious customers could appreciate a more surgical approach to protection that saves them money.<\/li>\n<li><b>Keep practicing good cyberhygiene:<\/b>\u00a0While ransomware has evolved, don\u2019t lose sight of the basic blocking and tackling of security. Make sure to patch, run antivirus (or use endpoint protection when you can), and back up files in the cloud so you have something ready to go if a local copy gets encrypted. Beyond that, try to lock down common attack vectors\u2014use email protection to prevent malspam and use web protection to help prevent drive-by downloads.<\/li>\n<li><b>Follow compliance guidelines:\u00a0<\/b>The recent Maze ransomware attack mentioned earlier extorted victims by releasing data if they didn\u2019t pay the ransom. What makes this so potent right now is the increase in reporting requirements for data breaches. If someone gets onto your systems and drops ransomware payloads, they can likely also peer into protected data. Whether businesses don\u2019t see this as a breach or try to avoid potential fines, criminals expect to make money by threatening to expose them. We cannot stress enough that you need to work with authorities and follow compliance guidelines if you detect a breach. Doing the right thing here can take the wind out of extortionists\u2019 sails.<\/li>\n<li><b>Use\u00a0<\/b><a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\"><b>endpoint protection<\/b><\/a><b>:\u00a0<\/b>Where possible, use strong endpoint protection on your customers\u2019 machines. Endpoint protection can help prevent more attacks than just ransomware (or malware) and often take action on your behalf. Ideally, you would put endpoint protection on every managed device, but some customers may be cost-averse and want to stick simply to antivirus. In that case, at least put endpoint protection on the riskiest devices\u2014those containing sensitive data and belonging to high-risk employees like executives or system administrators.<\/li>\n<\/ul>\n<h3>Fighting today\u2019s ransomware<\/h3>\n<p>Ransomware has evolved with the times. From choosing higher-value targets to extortion schemes leveraging compliance fines, cybercriminals have modified their ransomware methods to threaten governments and businesses alike. But that doesn\u2019t mean IT service businesses have fallen behind\u2014following the above tips can help you reduce your customers\u2019 risk.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>We mentioned endpoint protection in this post. SolarWinds<sup>\u00ae<\/sup>\u00a0Endpoint Detection &amp; Response (EDR) not only uses seven AI engines to discover and defend against potential threats, but also can automatically roll back an endpoint to a known safe state after a ransomware attack, maximizing safety and minimizing disruption.\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/rmm\/endpoint-detection-and-response\" target=\"_blank\" rel=\"noopener\">Learn more today<\/a>.\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-6448","post","type-post","status-publish","format-standard","hentry","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trends in Ransomware: Staying Up-to-Date in the Fight - N-able<\/title>\n<meta name=\"description\" content=\"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trends in Ransomware: Staying Up-to-Date in the Fight - N-able\" \/>\n<meta property=\"og:description\" content=\"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-20T22:14:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T22:16:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Trends in Ransomware: Staying Up-to-Date in the Fight\",\"datePublished\":\"2020-04-20T23:14:07+01:00\",\"dateModified\":\"2021-04-09T22:16:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\"},\"wordCount\":954,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Security\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\",\"name\":\"Trends in Ransomware: Staying Up-to-Date in the Fight - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-04-20T23:14:07+01:00\",\"dateModified\":\"2021-04-09T22:16:26+00:00\",\"description\":\"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Security\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/security\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trends in Ransomware: Staying Up-to-Date in the Fight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trends in Ransomware: Staying Up-to-Date in the Fight - N-able","description":"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date","og_locale":"fr_FR","og_type":"article","og_title":"Trends in Ransomware: Staying Up-to-Date in the Fight - N-able","og_description":"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-04-20T22:14:07+00:00","article_modified_time":"2021-04-09T22:16:26+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Trends in Ransomware: Staying Up-to-Date in the Fight","datePublished":"2020-04-20T23:14:07+01:00","dateModified":"2021-04-09T22:16:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date"},"wordCount":954,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Security"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date","url":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date","name":"Trends in Ransomware: Staying Up-to-Date in the Fight - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-04-20T23:14:07+01:00","dateModified":"2021-04-09T22:16:26+00:00","description":"Ransomware is a major threat to businesses and individuals, and it&#039;s constantly evolving. Find out how to keep up-to-date with the latest trends and ensure you stay stay safe.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/trends-in-ransomware-staying-up-to-date#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Security","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/security"},{"@type":"ListItem","position":2,"name":"Trends in Ransomware: Staying Up-to-Date in the Fight"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6448","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=6448"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/6448\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=6448"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}