Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware is a kind of malware that withholds some digital assets (mostly user’s data) from its victims and asks for payment for their release. Ransomware could be the best reason yet to use cloud data storage systems. Over the past several weeks, many Windows users were infected by CryptoLocker malware that encrypts your files until you pay a ransom. US-CERT has reported that the primary means of infection are phishing emails containing malicious attachments, but the aforementioned malware can also be deployed by malicious web sites by exploiting outdated browser plugins.

security-cloud

The CryptoLocker

Removing the CryptoLocker is not complex, but the real problem is that all your important files will remain encrypted and useless until you pay the ransom. Furthermore, some victims have claimed that they paid and did not receive the promised decryption key. CryptoLocker has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, and network file shares. The ransomware then connects to attackers’ server where it deposits the private encryption key. Files are encrypted using strong asymmetric encryption. The Cryptolocker asks you to pay $300 ransom by using MoneyPak or Bitcoins in 3-4 days to get your computer’s functionality back. If you don’t pay, it will delete your encryption key and you will not have any way to decrypt your files. Users can get their file back only by restoring from external backup or shadow copy, so using cloud storage to backup your important data can prevent damage from the Cryptolocker and similar ransomware threats. In addition, the attackers have recently launched a Russia based hosting web site that allows victims to purchase the key for their infected encrypted files. Most antivirus companies have released updates for their users to detect Cryptolocker and remove registry keys which are required to show the screen for paying the ransom. So, the attackers have launched the decryption web site to be eventually paid for encryption key of infected user’s files.

Prevention

To protect computers and local networks from ransomware infections you can take common preventative measures:

  •  do not follow web links or submit any information in suspicious e-mail messages and safely handle e-mail attachments
  • use up-to-date anti-malware software
  •  perform regular backups of all critical data on dislocated servers or use cloud data storage offers
  •  patch regularly your operating system and applications
  •  use IDS and firewalls to detect malicious activities
  •  use authorization for shared drives

Backup on the cloud

Key benefits of cloud backup are lower costs, risk mitigation to the service provider, flexibility and agility, improved data protection, and ease of use. Through cloud backups, small businesses can build recover solutions without investing in hardware and software licensing. They can easily store their data in remote servers with included vendor’s additional redundancy and protect themselves from ransomware and similar threats.

By Darko Androcec

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Four Recurring Revenue Imperatives

Four Recurring Revenue Imperatives

Revenue Imperatives “Follow the money” is always a good piece of advice, but in today’s recurring revenue-driven market, “follow the customer” may be more powerful. Two recurring revenue imperatives highlight the importance of responding to, and cherishing customer interactions. Technology and competitive advantage influence the final two. If you’re part of the movement towards recurring…

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises: It’s About More Than Just Dollars

Cloud-Based Services vs. On-Premises The surface costs might give you pause, but the cost of diminishing your differentiators is far greater. Will a shift to the cloud save you money? Potential savings are historically the main business driver cited when companies move to the cloud, but it shouldn’t be viewed as a cost-saving exercise. There…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Don’t Be Intimidated By Data Governance

Don’t Be Intimidated By Data Governance

Data Governance Data governance, the understanding of the raw data of an organization is an area IT departments have historically viewed as a lose-lose proposition. Not doing anything means organizations run the risk of data loss, data breaches and data anarchy – no control, no oversight – the Wild West with IT is just hoping…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…