How Ransomware Attacks - What Defenders Should Know About the Most Prevalent and Persistent Malware Families

How Ransomware Attacks - What Defenders Should Know About the Most Prevalent and Persistent Malware Families

Ransomware creators are acutely aware that network or endpoint security controls pose a fatal threat to any operation, so they've developed a fixation on detection logic. Modern ransomware spends an inordinate amount of time attempting to thwart security controls, tilling the field for a future harvest.

Download this whitepaper to learn about several prominent ransomware families distinguished by the method attackers use to spread the infection including:

  • Cryptoworm - A standalone ransomware that replicates itself to other computers for maximum reach and impact;
  • Ransomware-as-a-Service (RaaS) - A ransomware sold on the dark web as a distribution kit to anyone who can afford it;
  • Automated Active Adversary - The ransomware is deployed by attackers who use tools to automatically scan the internet for IT systems with weak protection.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.