RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2
2020/07/09 08:38:23

Ransomware of Things (RoT)

Main article: Virus racketeer (Encoder), Ransomware

2020: Check Point studied tactics of cyberswindlers of Ransomware of Things (RoT)

According to the report of cyber security of Check Point 2020, the attacks using racketeers were very widespread because of high success. At this type of cyber attacks cybercriminals demanded from the companies the redemption for the stolen information. On average 8% of the companies become the victims of such threats weekly. It became known on July 8, 2020.

In the world of the growing giperpodklyuchennost when devices are connected to the same networks, evolution of this type of threats is observed. Instead of intercepting information or data of the company or the individual, malefactors undertake complete device management, connected to the Internet. Users will not be able to use them until the redemption is paid. This tactics is called Ransomware of Things (RoT). The traditional attacks using racketeers represent risk for the organizations, but the RoT-attacks bear serious effects for all society in general.

An opportunity to be connected to worldwide network not only bears advantages, but also creates risks of cyber security. Internet of Things is included more and more into everyday life, but spaces in security remain and give to cybercriminals opportunities for the attacks. 1 of 4 attacks is directed to IoT-devices as thanks to outdated operating systems and lack of means of protecting it is easy to crack these devices.

The RoT-attacks are similar to traditional the fact that they require the redemption – but on it their similarity comes to an end. In case of the RoT-attacks, and not just data, and the whole device, is held "hostage" using the virus known as jackware. Jackware is the malware which controls the devices connected to the Internet even if they do not process data. For example, in this case the cybercriminal can control all types of home appliances in the house. In more complex cases in the connected houses cybercriminals can manage deliveries, such as electricity or water, and even house automation.

Going beyond the house environment to consider something more large-scale, it is visible that effects can be much more serious. For example, if it is about traffic safety – the cars connected to the Internet become more and more, such machine already everyday occurrence. It is expected that by the end of 2020 they will make 22% of all cars in the world. Owners of such machines can, for example, through the application on the smartphone open and close doors, start the engine. All this allows cybercriminals to commit assaults on the machine as directly, and using the smartphone. If the malefactor gets access to driving, it can threaten life of his passengers, pedestrians and other vehicles. So far it did not occur yet, but considering technology progress of such cars, such attack of RoT is possible in the near future.

The last generations of cyberthreats very sophisticated – they use old tactics absolutely otherwise to bypass traditional solutions of security. The RoT-attacks well show it as cybercriminals use connectivities to IoT-devices and lack of protection on them for start of the attacks and, perhaps, capture of control over the whole segments of society.

All this can seem very futuristic, but cybercriminals, as well as technologies, develop promptly. Thus, it is very important to use approach to cyber security which is aimed at prevention of risks and threats even before their emergence. There is no second chance therefore the best protection – prevention using technologies.

See Also