In this blog we know about kesaya ransomeware attack and #trendingnow
Inside the hacks that lock down computer systems and damage businesses.
Just hours before the Fourth of July weekend, a huge, coordinated cyberattack hit hundreds of businesses across the world. A group of hackers broke in by exploiting a hole in the software code of an information technology company with a wide-ranging client base, then demanded $70 million in ransom.
A large grocery chain in Sweden shut down hundreds of stores. Schools in New Zealand warned that staff might not be able to use computers.
It was the biggest case yet of a scourge that affects the world’s companies and government agencies nearly every day, and that is only getting worse. In an analysis of publicly reported ransomware attacks against health-care providers, municipalities and schools, The Washington Post found that ransomware attacks in the United States more than doubled from 2019 to 2020.
To reconstruct the anatomy of a ransomware attack, The Post conducted its own data analysis and spoke with nearly a dozen cybersecurity experts, law enforcement officials, negotiators and victims. The Post used different examples to illustrate the components of how an attack happens. The resulting examination has five parts: the hackers, the hack, the negotiation, the payment and the aftermath.
[Hackers demand $70 million to unlock businesses hit by sprawling ransomware attack]
The costs of such attacks add up. Some experts conservatively estimate that hackers received $412 million in ransom payments last year.
“Criminals are economically motivated and they are not dumb,” said Joshua Motta, chief executive of cyber-insurance company Coalition. “For a while, it was credit-card skimming, data breaches, reselling Social Security numbers. Ransomware is a considerably more lucrative business model.”
Some attacks, like the one on Kaseya, happen when hackers find a vulnerability in a company’s software and use that to get into their system. But most use relatively unsophisticated methods to break into computers, such as sending phishing emails that trick employees into opening an attachment or clicking on a link that downloads malicious software, which goes on to encrypt files and bar access to the whole network.
This link related to kesyaransomeware attack
So let’s take a graph to see the ransomware case increases …
NO 1 PIC ::–
The first pic says that most of the ransomware attacks performed in the Saudi Arabia where 88% cases performed…
NO 2 PIC ::–
The second graph show that in which field more attacks performed and which attacks criteria mostly used by hackers ..
WHAT IS RANSOMEWARE ATTACK ??
Ransomeware attack is a malicious software which is gaining access to your computer system and encrypt your file like .exe file and any your company detail file or folder then the hackers demand money for decrypt your file actully the hackers use more tricks to perform these attacks like phishing emails, scam through messages and social engineering in which hackers read your mindset according to this they send u emails and messages .
Since their history to at this time the biggest ransomeware attack is wannacry which is pretend in 2017 which is effected 150 countries and millions of computer systems. And run without any spam link or created by two Korean programmers .
HOW TO DEFEAT WITH RANSOMEWARE ATTACK..
- 1. Isolate the Infection: Prevent the infection from spreading by separating all infected computers from each other, shared storage, and the network.
- 2. Identify the Infection: From messages, evidence on the computer, and identification tools, determine which malware strain you are dealing with.
- 3. Report: Report to the authorities to support and coordinate measures to counter attack.
- 4. Determine Your Options: You have a number of ways to deal with the infection. Determine which approach is best for you.
- 5. Restore and Refresh: Use safe backups and program and software sources to restore your computer or outfit a new platform.
- 6. Plan to Prevent Recurrence: Make an assessment of how the infection occurred and what you can do to put measures into place that will prevent it from happening again.
Today all company need to trained their staffs to identify for any spam emails and links at every six months .
This is a quote for ransomware attack
Ransomeware is unique among cybercrimes because in order is attack to be successful it requires the victim to willing accomplish after the fact ..
HOW RANSOMEWARE WORKS UNDERSTAND THROUGH A IMAGE ALL PROCESS …




