Main article: Virus racketeer (Encoder), Ransomware
2020: Check Point studied tactics of cyberswindlers of Ransomware of Things (RoT)
According to the report of cyber security of Check Point 2020, the attacks using racketeers were very widespread because of high success. At this type of cyber attacks cybercriminals demanded from the companies the redemption for the stolen information. On average 8% of the companies become the victims of such threats weekly. It became known on July 8, 2020.
In the world of the growing giperpodklyuchennost when devices are connected to the same networks, evolution of this type of threats is observed. Instead of intercepting information or data of the company or the individual, malefactors undertake complete device management, connected to the Internet. Users will not be able to use them until the redemption is paid. This tactics is called Ransomware of Things (RoT). The traditional attacks using racketeers represent risk for the organizations, but the RoT-attacks bear serious effects for all society in general.
An opportunity to be connected to worldwide network not only bears advantages, but also creates risks of cyber security. Internet of Things is included more and more into everyday life, but spaces in security remain and give to cybercriminals opportunities for the attacks. 1 of 4 attacks is directed to IoT-devices as thanks to outdated operating systems and lack of means of protecting it is easy to crack these devices.
The RoT-attacks are similar to traditional the fact that they require the redemption – but on it their similarity comes to an end. In case of the RoT-attacks, and not just data, and the whole device, is held "hostage" using the virus known as jackware. Jackware is the malware which controls the devices connected to the Internet even if they do not process data. For example, in this case the cybercriminal can control all types of home appliances in the house. In more complex cases in the connected houses cybercriminals can manage deliveries, such as electricity or water, and even house automation.
Going beyond the house environment to consider something more large-scale, it is visible that effects can be much more serious. For example, if it is about traffic safety – the cars connected to the Internet become more and more, such machine already everyday occurrence. It is expected that by the end of 2020 they will make 22% of all cars in the world. Owners of such machines can, for example, through the application on the smartphone open and close doors, start the engine. All this allows cybercriminals to commit assaults on the machine as directly, and using the smartphone. If the malefactor gets access to driving, it can threaten life of his passengers, pedestrians and other vehicles. So far it did not occur yet, but considering technology progress of such cars, such attack of RoT is possible in the near future.
The last generations of cyberthreats very sophisticated – they use old tactics absolutely otherwise to bypass traditional solutions of security. The RoT-attacks well show it as cybercriminals use connectivities to IoT-devices and lack of protection on them for start of the attacks and, perhaps, capture of control over the whole segments of society.
All this can seem very futuristic, but cybercriminals, as well as technologies, develop promptly. Thus, it is very important to use approach to cyber security which is aimed at prevention of risks and threats even before their emergence. There is no second chance therefore the best protection – prevention using technologies.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls