November 25, 2014 By Shane Schick 2 min read

Antivirus software can help fend off many computer security threats, but there may be a better way for companies to defend themselves against ransom malware, a new research study from Bromium suggests.

As its name implies, ransom malware, or “ransomware,” sets itself apart from sneakier cybersecurity threats by making sure victims realize their devices and data have been compromised. There is usually a demand for payment in order to unlock or retrieve stolen information. Many of these attacks have been attributed to sources based in Russia.

Analysts at Bromium, a California-based company that uses virtualization technology to isolate security threats, said they assessed close to 30 different incidents over the past year to see how cybercriminals are improving the way they use this technique. They concluded that while earlier threats such as CryptoLocker could be handled relatively easily, new variants such as TorrentLocker and CryptoWall are much more advanced. In some cases, they do damage before even contacting the command-and-control server, making them more difficult to detect and increasing the range of targets.

As an article from CSO Online points out, Bromium does not actually sell antivirus software, so its recommendations that favor backup technologies should be understood in that context. In the meantime, however, companies should look out for techniques such as “malvertising,” which may eventually eclipse traditional social engineering as a way to distribute ransom malware to a desktop. In fact, SC Magazine recently reported on an attempt by cybercriminals to use free Web apps to promote potentially dangerous links to CryptoWall and similar threats.

There is no doubt that ransom malware is alive and well. Just last week, Fox News reported CryptoWall affecting computer users in Connecticut, while Network World profiled a recent attempt to extort public officials in Detroit by taking a municipal database hostage. Infosecurity Magazine has also noted the rise of Win32/Crowti, a type of ransomware that could be particularly dangerous for large companies and requires victims to pay up using Bitcoin instead of traditional currencies.

Fortunately, more resources are available than ever before to inform security experts and the public on the range of cryptographic attacks out there today. The Financial Times, for instance, recently profiled “Spam Nation,” a book written by highly regarded security expert Brian Krebs about the proliferation of malicious software through email. As the holidays get closer, a little extra education on computer security threats might be the gift that keeps on giving.

More from

Crisis communication: What NOT to do

4 min read - Read the 1st blog in this series, Cybersecurity crisis communication: What to doWhen an organization experiences a cyberattack, tensions are high, customers are concerned and the business is typically not operating at full capacity. Every move you make at this point makes a difference to your company’s future, and even a seemingly small mistake can cause permanent reputational damage.Because of the stress and many moving parts that are involved, businesses often fall short when it comes to communication in a crisis.…

The future of cybersecurity: What to expect at Black Hat 2024

3 min read - The cybersecurity landscape continues to evolve at a breakneck pace. New threats emerge daily, and the stakes have never been higher, especially as artificial intelligence (AI) is infused into every aspect of business. As security and business leaders, it's crucial to stay ahead of the curve and ensure your organization is equipped to handle the ever-changing threat landscape. For over two decades, Black Hat has been the premier gathering of cybersecurity professionals, providing a platform for experts to share knowledge,…

Recent CrowdStrike outage: What you should know

3 min read - On Friday, July 19, 2024, nearly 8.5 million Microsoft devices were affected by a faulty system update, causing a major outage of businesses and services worldwide. This equates to nearly 1% of all Microsoft systems globally and has led to significant disruptions to airlines, police departments, banks, hospitals, emergency call centers and hundreds of thousands of other private and public businesses. What caused this outage in Microsoft systems? The global outage of specific Microsoft-enabled systems and servers was isolated to…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today