This is how the triple extortion attack works, with which criminals pressure users.
As companies find solutions to attacks, cybercriminals develop new techniques to overcome these barriers and become more difficult to detect. An example is what’s happening with a new mod called a triple extortion attack Ransomware.
Ransomware translates to data hijacking, which means that criminals are able to access and capture company information to then demand a ransom or store it for other criminal activities.
You may be interested in: How to understand the data that an application downloaded to my mobile phone has access to
The target for which attacks are usually launched are end users. “They don’t go into the end servers, but they go into the user. The easiest way is to get a friendly email or an email pretending to be a co-worker, a boss or some kind of promotion,” he said. Javier Castrion, an engineer Veeeam For North Latin America.
But as security systems improve, cybercriminals are developing new strategies, and one of them involves much more powerful and invasive management.
This is how the triple extortion attack works, with which criminals pressure users.
You may also be interested in: WhatsApp and Facebook scam alert promising van raffle
In this modality, they seek money, not only from organizations, but from any participant who may be involved. This is because companies achieve a high level of defense and can recover stolen data without paying a ransom.
For example, if a company restores information and does not pay the requested money, attackers can expand to block services, affecting users or associated organizations.
You may be wondering why accessing the Windows clipboard can cause security problems
Typically, ransomware has three layers of operations, first through data encryption, which is information retrieval.
If that doesn’t work, it risks exposing sensitive data. Now a third has been added, which is pressure through calls, emails or emails Distributed denial of serviceWhich is to crash a website or platform so that it doesn’t work.
A specific case was in a Finnish psychotherapy clinic. The criminals hacked the clinic’s network and encrypted the data, but then held patients for ransom, threatening to release personal data about therapy sessions if they didn’t pay.
This is how the triple extortion attack works, with which criminals pressure users.
You may also be interested in: Three Types of Data Theft from Cell Phone or Computer Bluetooth
The Cybercriminals They will never stop and it is almost impossible to create a 100% solution, so the best alternative is to strengthen the culture of prevention and approach this 100% through various technologies.
Realizing that everyone is vulnerable is a great start, protecting end users by motivating them not to visit unknown pages and not succumb to pressure is a way to deflect attacks.
You may be interested: those with Windows 7 and Windows 8 will be vulnerable to cyber attacks
All of this is backed up by robust data recovery processes and optimal response times to stop data theft from progressing.
One way to do this is to use similar technologies irreplaceabilityThis means that “the data cannot be modified by any entity outside the organization or by a compromised user,” he explains. Castrillon.
This way, if the end user is trapped and an attack is carried out, the “information will survive”.