Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware is a kind of malware that withholds some digital assets (mostly user’s data) from its victims and asks for payment for their release. Ransomware could be the best reason yet to use cloud data storage systems. Over the past several weeks, many Windows users were infected by CryptoLocker malware that encrypts your files until you pay a ransom. US-CERT has reported that the primary means of infection are phishing emails containing malicious attachments, but the aforementioned malware can also be deployed by malicious web sites by exploiting outdated browser plugins.

security-cloud

The CryptoLocker

Removing the CryptoLocker is not complex, but the real problem is that all your important files will remain encrypted and useless until you pay the ransom. Furthermore, some victims have claimed that they paid and did not receive the promised decryption key. CryptoLocker has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, and network file shares. The ransomware then connects to attackers’ server where it deposits the private encryption key. Files are encrypted using strong asymmetric encryption. The Cryptolocker asks you to pay $300 ransom by using MoneyPak or Bitcoins in 3-4 days to get your computer’s functionality back. If you don’t pay, it will delete your encryption key and you will not have any way to decrypt your files. Users can get their file back only by restoring from external backup or shadow copy, so using cloud storage to backup your important data can prevent damage from the Cryptolocker and similar ransomware threats. In addition, the attackers have recently launched a Russia based hosting web site that allows victims to purchase the key for their infected encrypted files. Most antivirus companies have released updates for their users to detect Cryptolocker and remove registry keys which are required to show the screen for paying the ransom. So, the attackers have launched the decryption web site to be eventually paid for encryption key of infected user’s files.

Prevention

To protect computers and local networks from ransomware infections you can take common preventative measures:

  •  do not follow web links or submit any information in suspicious e-mail messages and safely handle e-mail attachments
  • use up-to-date anti-malware software
  •  perform regular backups of all critical data on dislocated servers or use cloud data storage offers
  •  patch regularly your operating system and applications
  •  use IDS and firewalls to detect malicious activities
  •  use authorization for shared drives

Backup on the cloud

Key benefits of cloud backup are lower costs, risk mitigation to the service provider, flexibility and agility, improved data protection, and ease of use. Through cloud backups, small businesses can build recover solutions without investing in hardware and software licensing. They can easily store their data in remote servers with included vendor’s additional redundancy and protect themselves from ransomware and similar threats.

By Darko Androcec

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

5 Cloud-Based Customer Service Trends

5 Cloud-Based Customer Service Trends

Customer Service Trends Customer service has become the new battleground in today’s marketplace. In fact, 97 percent of customers around the world now say that customer service makes a key difference in whether they decide to go with a brand or not, Microsoft reports. Many of the biggest changes in today’s customer service landscape center…

Conquering Disease with Artificial Intelligence and IBM Watson

Conquering Disease with Artificial Intelligence and IBM Watson

Artificial Intelligence and IBM Watson Artificial Intelligence, or AI, is growing increasingly pervasive in today’s modern world. Perhaps the most publicized and recognizable application of AI to date, IBM’s Jeopardy-winning computer, Watson, is now being used to help cure cancer. IBM announced the development of Watson for Genomics on Wednesday at the National Cancer Moonshot…

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

5 Predictions For Education Technology

5 Predictions For Education Technology

Education Technology Although technology has fast influenced most sectors of our world, education is an area that’s lagged behind. Many classrooms still employ the one-to-many lecturing model wherein the average student is catered for while a few are left behind, and others bored. Recently, there’s been a drive to uncover how to use technology successfully…

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security: The Top 8 Risks According To ENISA

Cloud Security Risks Does security in the cloud ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that,…

The Future of M2M Technology & Opportunities

The Future of M2M Technology & Opportunities

The Future Of The Emerging M2M Here at CloudTweaks, most of our coverage is centered around the growing number of exciting and interconnected emerging markets. Wearable, IoT, M2M, Mobile and Cloud computing to name a few. Over the past couple of weeks we’ve talked about Machine to Machine (M2M) such as the differences between IoT and…

Cloud Infographic – Disaster Recovery

Cloud Infographic – Disaster Recovery

Disaster Recovery Business downtime can be detrimental without a proper disaster recovery plan in place. Only 6% of businesses that experience downtime without a plan will survive long term. Less than half of all businesses that experience a disaster are likely to reopen their doors. There are many causes of data loss and downtime —…

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

Four Reasons Why CIOs Must Transform IT Into ITaaS To Survive

CIOs Must Transform IT The emergence of the Cloud and its three delivery models of Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS) has dramatically impacted and forever changed the delivery of IT services. Cloud services have pierced the veil of IT by challenging traditional method’s dominance…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

The Future Of Work: What Cloud Technology Has Allowed Us To Do Better

What Cloud Technology Has Allowed Us to Do Better The cloud has made our working lives easier, with everything from virtually unlimited email storage to access-from-anywhere enterprise resource planning (ERP) systems. It’s no wonder the 2013 cloud computing research IDG survey revealed at least 84 percent of the companies surveyed run at least one cloud-based application.…