The Unusual Suspects: Ransomware and Crypto-Trojans

Is your Business or Institution Prepared for a Ransomware Attack?

Industries determined to be at high risk; Software development, large factories, college campuses, services providers, utilities and medical institutions could perhaps be breaching for peril if not prepared for direct targeted ransomware attacks. With many newcomers entering the "work-from-home" or "remote" workforce connecting their devices to an outside network, this new practice may actually be enabling third party access exposing vulnerabilities to a companies competitors / rivals.

As is the case with most humans potentially, you are you're own worst enemy. Thus it's important to assess what security experts call an inside threat. These types of infection methods need to be deeper analyzed as remote IT security positions are on the rise. The range of new methods that which become available can also usher in new forms of attacks and exploits security experts aren't prepared for.

What Types of Attacks are the Most Dangerous

I beleive high-risk targets are unfortunately also the most dangerous. For example a power plant, which we have seen in the past shut down, yet although funds can be recovered in these scenarios the damage of taking down infrastructure is more prevalent. White hat research in this field is paramount, unless you want hackers playing a game of chicken against a freight train.


What Security Measures Should you Take?

Gather resources from independent agencies such as the RSA, as well as documentation and reports from other goal oriented agencies. Management should prepare presentations purposed for lower level employees about the dangers of network contamination as this should be a top priority going forward into 2022. Also libraries, schools, and public infrastructure should be monitored for low level threats that could extrapolate bringing rise to an era of web3 scripting filled with blockchain exploits. Network injections, crypto malware coupled with spyware etc. A digital snowball moving around multiple OS from the multitude of upgrades in interconnected and interoperability made in the last decade, is something we are only halfway prepared for.


What's the Difference between Ransomware and Trojan attacks?

Trojans are easier to explain, and most people understand the concept of a trojan-horse. So a package or exploit is opened or performed as an action on one device inside a network, which exposes the rest of the networks flaws and vulnerabilities to additional attacks. Some Trojans may even remain or lay dormant inside a "secured-network" for months before being exposed depending on the destructiveness of the exploit. The best way to avoid these types of attacks is to not allow your network to be fully exposed and to create lower-tier and guest networks that will keep attackers at bay. 

Ransomware is a more recent term that can be described as a type of software or program that was perhaps accidentally or maliciously installed on part of your network or operating system, even a functional part of your supply chain or way of distribution inside a factory can be directly targeted with ransomware. To be blunt, if a ransomware engineer knows how your system functions, and they have the desire or willpower they can design a blockade or shut-off valve/mechanism forcing you to pay a lump sum (in most cases due to anonymity cryptocurrency.) 


What Governments can do to Protect Infrastructure...

Institutions like the Pentagon have already taken multiple security measures to make sure that the highest levels of government have a layer of broad security and keep a buffer on all activities being monitored. Other agencies are also taking measures at making sure employees are using only select approved devices. This is really crucial for other businesses to consider doing because a single older or unrated cellular device that is vulnerable could jeopardize the security measures you already have in place. 

So one process I like to endorse would be a Google-esque approach of keeping things separate before introduction or integration. If you have something new you want to perhaps add-on to your current product or line of production, place that entire project in a beta environment, and start testing from there. It is a simple process I took note of that will allow your business the flexibility of understanding a new threat to your infrastructure -- that before you didn't factor in or expect. I guess the point I am making is, it's probably more important to maintain function and security as a number one priority for most businesses that could be at potential risk for crypto malware attacks.