You may have heard about BackupAssist’s new ransomware-protection feature, CryptoSafeGuard. Here’s how to get it and set it up to protect your backups.
Posts Tagged ‘ransomware’
Offers Guidance to Small-to-Medium Enterprises (SMEs) for Eliminating the Threat of Ransomware – Reminds that Replicating Data to the Cloud Can Simply Amplify the Infection
Melbourne, Australia and BOSTON (October 4, 2017) – BackupAssist®, a leading provider of automated Windows server backup and recovery software for small and medium enterprises (SMEs), today announced that Storage Switzerland, a premier authority on virtualization and storage, has released a Briefing Notes featuring its newly announced BackupAssist CryptoSafeGuard™ ransomware protection entitled, “Can Ransomware Infect Your Backups? – BackupAssist Briefing Note.”
In the report, Storage Switzerland’s findings include the fact that one of the biggest challenges with ransomware in a business environment is what some call “infection magnification.” This refers to how malware products start with one infected computer and spread throughout the environment. (more…)
BackupAssist 10.1 is now available! With this latest version, we introduce a powerful new feature designed to protect your backups from ransomware called CryptoSafeGuard.
When ransomware infects your system, it can spread fast. But so long as your backups are uninfected, you can avoid paying a ransom. But what happens if ransomware manages to infect your backups, or you accidentally back up an infected file?
That’s where CryptoSafeGuard comes in. CryptoSafeGuard actively protects your backups from ransomware, alerts you when it detects suspicious behavior, and more. This way, you’ve got a clean copy to restore your data from.
CryptoSafeGuard will be available to all users with both BackupAssist 10.1 and active Upgrade Protection. To represent this new generation of service, we have decided to change the name of Upgrade Protection to BackupCare.
To learn more about CryptoSafeGuard and how it protects your backups, read on. You can also try out CryptoSafeGuard by downloading the free trial of 30 day Trial of BackupAssist 10.1.
Ransomware makers are cunning, exploitative, and deceptive. And that’s exactly why, if a ransomware message pops up on your screen, you should first take it with a grain of salt.
One of the latest trends in 2017 is not to even infect your system with ransomware. Instead, cybercriminals will just tell you they’ve compromised your system, and a place for you to deposit the ransom money.
And it’s worked. According to a recent Citrix Study which polled 500 U.K businesses, 200 of these reported being “bluffed” by a cybercriminal, with nearly two out of three forking over a payment.
The cost of each ransomware bluff was a whopping $16,000 at today’s exchange rate, with several victims playing double that amount—$32,000—to decrypt files that weren’t even encrypted in the first place!
The study also concluded a worrying trend – one that is profoundly altering the landscape of operating a business anywhere in the world.
If you needed any evidence that ransomware makers have no shame, here it is. The creators of one ransomware strain set up a ‘technical support’ page for their victims—and the messages they have left are truly distressing.
A father with little cash, robbed of his baby’s pictures; a non-profit that raises money for curing blood cancer, pleading for a refund; a housecleaning business set up by maids who can’t afford to pay the ransom.
The site not only shows victims pleading directly with the ransomware makers. It also shows an exceptionally rare event; the ransomware makers speaking back to the victims, giving a glimpse into their psychology.
I’m going to say something controversial, so brace yourself—the WCry ransomware was a good thing.
Now make no mistake about it. Ransomware is evil. It’s used to literally hold people’s lives hostage. Just like a tornado, it destroys businesses and lives. But it’s far worse, because people make ransomware…and knowing what it does, deliberately inflict it upon other people.
If you haven’t heard of the WCry ransomware (A.k.a. WannaCry or WannaCrypt), you must have been living under a rock. Just over a week ago, the WCry ransomware worm attacked more than 200,000 computers in 150 countries.
And when it did, something changed.
After the failing to score $18k from shutting down hospitals and endangering lives, the makers of the Samsam ransomware have decided brute force is best.
Going back to basics, they’ve begun scanning for open ports on people’s servers, and conducting forced password cracking attacks. Once they’ve smashed through, they drop their infamous Samsam ransomware—an extortion software—on the system, and wait for payment.
And when they hit the Bingham County government servers in Idaho with their brute force attack, it may as well have been “Bingo” County.
Keeping in line with their “threatening lives” policy, the makers of Samsam struck the county’s 911 emergency systems, shutting down the infrastructure needed to send ambulances, police and firefighters to people literally in mortal peril.
Remember how we predicted in 2017 that with law enforcement unable to do anything about ransomware, vigilantes would rise up to fill the void?
Well, it’s already happened. Just two days ago, cyber-vigilantes took down 10,000 underground websites on the Dark Web. Many of these sites were black markets for weapons, drugs, illegal pornography, and downloading ransomware.
With the mass take down, over 100 Bitcoin scams, 1000+ carding and counterfeit sites, and multiple Bitcoin escrow and wallet sites have also been terminated.
For a list of our other predictions for 2017, here’s our article. To hear more about the landmark Dark Web hacking, read on.
Scant days before President Trump’s inauguration, the majority of Washington DC’s surveillance cameras were hacked by criminals in a massive cyber attack.
The infection downed 123 of its 187 network video recorders, each controlling four cameras each. And the perpetrator’s virus and motivations aren’t hard to guess.