Garland Technology ensures complete packet visibility by delivering a full platform of network TAP (test access point), inline bypass and packet broker products.
Garland Technology is committed to educating the benefits of having a strong foundation of network visibility and access. By providing this insight we protect the security of data across your network and beyond.
Garland Technology's resource library offers free use of white papers, eBooks, use cases, infographics, data sheets, video demos and more.
The TAP into Technology blog provides the latest news and insights on network access and visibility, including: network security, network monitoring and appliance connectivity and guest blogs from Industry experts and technology partners
Our extensive technology partnership ecosystem solves critical problems when it comes to network security, monitoring, application analysis, forensics and packet inspection.
Garland Technology is dedicated to high standards in quality and reliability, while delivering the greatest economical solutions for enterprise, service providers, and government agencies worldwide.
Whether you are ready to make a network TAP your foundation of visibility or just have questions, please contact us. Ask us about the Garland Difference!
Every day I hear that a company has solved the network and file security war with a new security widget. Yet every day there are more announcements of breaches, stolen identities, etc. According to the Identity Theft Resource Center (ITRC) in 2015 there were 781 data breaches in the U.S. As of July 12, 2016 ITRC report there were 522 U.S. breaches with 12,983,562 exposed records, which looks to surpass 2015.
What are the source of these breaches?
In 2016 the major threat is Ransomware, which attributes to a 20% increase in reported attacks.
Trend Micro’s definition of Ransomware is simple:
Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users' files unless a ransom is paid. More modern ransomware families, collectively categorized as crypto-ransomware, encrypt certain file types on infected systems and forces users to pay the ransom through certain online payment methods to get a decrypt key.
Ransomware is a billion dollar worldwide threat. The first viable Ransomware, Cryptowall, cost people over $325M in 2015. For the the first quarter of 2016 the costs are running over $209M which was given by CNBC and the FBI in April. The Q1 2016 number is alarming and could possibly reach the 1-2 Billion dollar level in 2016.
Although there are hundreds of variations of Ransomware, with new variants emerging daily, there are five signatures that define that your malware fits into the Ransomware family.
The four $ignatures of Ransomware Attacks
Ransomware is evolving at a rapid pace. In the beginning, it only attacked through computer browsers. It has evolved and is now attacking all operating systems (yes, Apple too) as well as mobile devices including android, iPhones and tablets.
Thanks to BleepingComputer.com we know that in July 2016 we have seen many new and dangerous variants.
Below is a list of the variants, for additional details, including fixes visit our friends at Bleeping Computer.
Everyday there are more attacks and variants found. Most costing the victim between $300 to several thousands dollars to decrypt. The alarming news is sometimes you pay and your data cannot be decrypted.
According to the FBI’s Cyber Division Assistant Director James Trainor, Ransomware attacks are on the rise in 2016 and will continue to grow. “These criminals have evolved over time and now bypass the need for an individual to click on a link. They do this by seeding legitimate websites with malicious code, taking advantage of unpatched software on end-user computers.”
So far in 2016 we have seen a number of new and much more sophisticated ransomware versions. Overall attacks up about 50%.
One has to remember that Ransomware is not just encrypting your data and getting you to pay to get it back. It is also a data thief method and in most cases it permanently corrupts your system allowing the hackers an easy permanent backdoor to your systems.
Some ransomware will do all three of these in one operation.
Encryption or Crypto-Ransomware
Lock Screen or WinLocker Ransomware
Master Boot Record Ransomware (MBR)
New ransomware is constantly changing, and will actually play a game with you, meet Jigsaw:
The serial file killer, “Jigsaw” targets over 120 file extension types to encrypt and sets a timer for payment. Jigsaw than starts deleting the encrypted files every hour that the victim does not pay. At some point, usually 72 hours, it deletes all files that were encrypted. There is a fix if you act quickly.
Even the with the best defenses and common sense in place, you could still become a victim of ransomware. The FBI's official policy is to not pay. However, we've individuals and the business sector give into demands. Healthcare in particular has been hard hit with ransomware attacks.
Here's the problem with paying in response to a ransomware attack:
“Paying a ransom doesn’t guarantee an organization that it will get its data back—we’ve seen cases where organizations never got a decryption key after having paid the ransom. Paying a ransom not only emboldens current cyber criminals to target more organizations, it also offers an incentive for other criminals to get involved in this type of illegal activity. And finally, by paying a ransom, an organization might inadvertently be funding other illicit activity associated with criminals.” said James C. Trainor, Jr. FBI Assistant Director.
As the Senior Technology Consultant & Chief Editor at LoveMyTool, Tim O’Neill has over 45 years of technology experience at data/voice and video networking analysis companies, including successful senior roles in Sales, Product Design, Marketing Management, Business Development and Security.