{"id":3562,"date":"2016-06-28T13:17:41","date_gmt":"2016-06-28T20:17:41","guid":{"rendered":"http:\/\/www.limetechsolutions.com\/?p=3562"},"modified":"2016-06-28T13:17:41","modified_gmt":"2016-06-28T20:17:41","slug":"crypto-ransomware-threats","status":"publish","type":"post","link":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/","title":{"rendered":"Crypto ransomware threats: a growing concern"},"content":{"rendered":"<h2><strong>Crypto ransomware threats: a growing concern<\/strong><\/h2>\n<p>This post is just to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients have been affected, but businesses in many industries (including banks, hospitals, and government institutions) have. The fallout has included loss of money, time, reputation, and public trust.<\/p>\n<p>&#8220;Locky,&#8221; &#8220;Robin Hood,&#8221; &#8220;Bart&#8221;&#8230;.you may or may not have heard their names, but the reality is that these kinds of schemes are increasing, and their targets are more often than not American businesses.<\/p>\n<p>So, how to protect yourself? First, a little background, and then some advice.<\/p>\n<h3><strong>What is crypto ransomware?<\/strong><\/h3>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/ncas\/alerts\/TA14-295A\">Crypto ransomware<\/a> comes under the cover of spam emails that arrive in your inbox. When you, the unwitting recipient, open the attachment included with the suspicious email, the malware rapidly encrypts your data, rendering it inaccessible. From that moment onward, the only way to retrieve your data is to decrypt it with a private key which is available (you guessed it) only after you pay a ransom. If you refuse to pay, the key is destroyed and your data remains forever encrypted.<\/p>\n<p>This is not a position you want to be in. So, here are some thoughts on how to protect yourself&#8230;<\/p>\n<h3><strong>How to protect yourself from ransomware threats and phishing schemes<br \/>\n<\/strong><\/h3>\n<p>There&#8217;s no magic bullet that will save you from crypto ransomware threats such as Locky, Robin Hood, or Bart. However, there are common-sense protective measures that you can take, to keep your information safe.<\/p>\n<p>&#8211;Check the identity and origin of emails you receive. <strong>Do not<\/strong> open emails (and especially email attachments) from senders you don\u2019t recognize.<\/p>\n<p>&#8211;Learn to identify and avoid <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">phishing emails<\/a>. Phishing emails are often disguised as emails from legitimate sources. Confirm the identity of the email sender by checking the sender\u2019s email address, and confirming it is accurate (and not a fake address).<\/p>\n<p>&#8211;Keep spam filters tight.<\/p>\n<p>&#8211;Keep all software up-to-date.<\/p>\n<p>&#8211;Store data offsite (either <a href=\"https:\/\/limetech.co\/cloud-storage\/\">on the cloud<\/a> or external drives that are kept offline). In the unfortunate event your data is affected, your information can be restored and you can ignore any ransom demands.<\/p>\n<p>&#8211;Schedule daily incremental backups (<a href=\"https:\/\/limetech.co\/cloud-backup\/\">cloud-based backup<\/a> software can do that)<\/p>\n<p><strong>Perhaps our most important warning is that every new email should be read with some degree of skepticism.<\/strong> If you are ever in doubt as to an email\u2019s authenticity, it is best to check with your IT team before opening any attachments, and especially before complying with any instructions.<\/p>\n<h3><strong>From the scammers&#8217; toolkit: social engineering<\/strong><\/h3>\n<p>Finally, scammers and malware criminals are increasingly using a technique called \u201c<a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\">social engineering<\/a>.\u201d This term covers a wide range of ways they attempt to gain your trust and convince you to comply with their instructions. Phishing emails may, for example, include your name, personal information, or the branding of a respected company.<\/p>\n<p>You may have heard of the <a href=\"https:\/\/www.microsoft.com\/en-us\">Microsoft<\/a> \u201cTech Support\u201d phone scam which has been aggressively targeting home users. This is an example of social engineering, where the criminal impersonates a Microsoft help desk technician, convincing the victim to allow them to remotely access their computer, download malware and even pay for the service! The wickedness of this scheme is compounded by the degree of complicity required of the victim.<\/p>\n<h3><strong>Educate yourself and stay aware<\/strong><\/h3>\n<p>There&#8217;s no better time than now to learn about about how to protect yourself and your team from crypto ransomware threats, phishing schemes, and the range of cyber scams that criminals employ in trying to access your information and steal your hard-earned cash.<\/p>\n<p>To read more about the ransomware threats we mention above, here are a few articles that address the topic:<\/p>\n<p><a href=\"http:\/\/arstechnica.com\/security\/2016\/02\/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro\/\">http:\/\/arstechnica.com\/security\/2016\/02\/locky-crypto-ransomware-rides-in-on-malicious-word-document-macro\/<\/a><\/p>\n<p><a href=\"https:\/\/www.onthewire.io\/new-bart-ransomware-released-by-locky-crew\/\">https:\/\/www.onthewire.io\/new-bart-ransomware-released-by-locky-crew\/<\/a><\/p>\n<p>More information about the Microsoft \u201cTech Support\u201d Phone Scam can be found below. Some of these articles are on the older side, but unfortunately the scam still persists, with some variations.<\/p>\n<p><a href=\"https:\/\/support.microsoft.com\/en-us\/security\">https:\/\/support.microsoft.com\/en-us\/security <\/a><\/p>\n<p><a href=\"http:\/\/www.wired.co.uk\/article\/malwarebytes\">http:\/\/www.wired.co.uk\/article\/malwarebytes<\/a><\/p>\n<hr \/>\n<p><em><strong>LimeTech<\/strong> is a creative tech company with a focus on innovation and adaptive change. We use technical know-how, design skills, and <a href=\"https:\/\/limetech.co\/company\/\">deep experience in entrepreneurship<\/a> to help companies reach their business goals. Our projects include mobile app development, <a href=\"https:\/\/limetech.co\/it-consulting-services\/\">IT infrastructure planning<\/a>, and <a href=\"https:\/\/limetech.co\/take-your-company-remote\/\">remote work solutions<\/a>. <\/em><em><a href=\"https:\/\/limetech.co\/contact-us\/\">Get in touch today<\/a> and find out what we can do for you.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crypto ransomware threats: a growing concern This post is just to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients&#8230;.<\/p>\n","protected":false},"author":2,"featured_media":3814,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[502,503],"tags":[575,576],"class_list":["post-3562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-events","category-small-business","tag-ransomware","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Crypto ransomware threats: a growing concern - Lime Tech<\/title>\n<meta name=\"description\" content=\"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Crypto ransomware threats: a growing concern - Lime Tech\" \/>\n<meta property=\"og:description\" content=\"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"Lime Tech\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-28T20:17:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1809\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kerry Abukhalaf\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#website\",\"url\":\"https:\/\/tjarb.com\/limetech\/\",\"name\":\"Lime Tech\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tjarb.com\/limetech\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg\",\"contentUrl\":\"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg\",\"width\":2560,\"height\":1809,\"caption\":\"crypto ransomware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#webpage\",\"url\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/\",\"name\":\"Crypto ransomware threats: a growing concern - Lime Tech\",\"isPartOf\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#primaryimage\"},\"datePublished\":\"2016-06-28T20:17:41+00:00\",\"dateModified\":\"2016-06-28T20:17:41+00:00\",\"author\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b\"},\"description\":\"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....\",\"breadcrumb\":{\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tjarb.com\/limetech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crypto ransomware threats: a growing concern\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b\",\"name\":\"Kerry Abukhalaf\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/tjarb.com\/limetech\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g\",\"caption\":\"Kerry Abukhalaf\"},\"url\":\"https:\/\/tjarb.com\/limetech\/author\/kerry-abukhalaf\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crypto ransomware threats: a growing concern - Lime Tech","description":"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Crypto ransomware threats: a growing concern - Lime Tech","og_description":"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....","og_url":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/","og_site_name":"Lime Tech","article_published_time":"2016-06-28T20:17:41+00:00","og_image":[{"width":2560,"height":1809,"url":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kerry Abukhalaf","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/tjarb.com\/limetech\/#website","url":"https:\/\/tjarb.com\/limetech\/","name":"Lime Tech","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tjarb.com\/limetech\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#primaryimage","inLanguage":"en-US","url":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg","contentUrl":"https:\/\/tjarb.com\/limetech\/wp-content\/uploads\/2019\/05\/151-scaled.jpg","width":2560,"height":1809,"caption":"crypto ransomware"},{"@type":"WebPage","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#webpage","url":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/","name":"Crypto ransomware threats: a growing concern - Lime Tech","isPartOf":{"@id":"https:\/\/tjarb.com\/limetech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#primaryimage"},"datePublished":"2016-06-28T20:17:41+00:00","dateModified":"2016-06-28T20:17:41+00:00","author":{"@id":"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b"},"description":"Crypto ransomware threats are no joke. Learn how to protect yourself from these rapidly evolving schemes....","breadcrumb":{"@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tjarb.com\/limetech\/blog\/news-and-events\/crypto-ransomware-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tjarb.com\/limetech\/"},{"@type":"ListItem","position":2,"name":"Crypto ransomware threats: a growing concern"}]},{"@type":"Person","@id":"https:\/\/tjarb.com\/limetech\/#\/schema\/person\/97bf8c90948d93f357913b2e6c73554b","name":"Kerry Abukhalaf","image":{"@type":"ImageObject","@id":"https:\/\/tjarb.com\/limetech\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/12fd5fa87dec15a146cfe890e7ac1beaf6a7e9223998a172316cdbcc73edb086?s=96&d=mm&r=g","caption":"Kerry Abukhalaf"},"url":"https:\/\/tjarb.com\/limetech\/author\/kerry-abukhalaf\/"}]}},"_links":{"self":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts\/3562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/comments?post=3562"}],"version-history":[{"count":0,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/posts\/3562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/media\/3814"}],"wp:attachment":[{"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/media?parent=3562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/categories?post=3562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tjarb.com\/limetech\/wp-json\/wp\/v2\/tags?post=3562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}