Yes, this is a thing now! I can’t believe I’m writing a post about the leader in Ransomware. But it is 2017 and we’re now entering the formative years of this relatively new threat…

Cerber, has been one of the most active malware families over the past year and has increased its share of the ransomware market to 87% in the first quarter of 2017. What’s significant for business’s is the fact that Cerber is primarily targeting corporate machines over home users, reports Microsoft.

The Cerber threat accounted for 70% of the ransomware market in January and has continually increased its share through February and March, amid a major decrease in the traditional Locky attacks. Malwarebytes, “Cybercrime tactics and techniques Q1 2017″ report (PDF) reads.

What is Cerber?

The Cerber Ransomware is an infection, similar to Locky, Spora, Sage and the now defunct TeslaCrypt, that is used to encrypt the victims’ files. The Cerber Ransomware adds the extension CERBER to every file it encrypts. After the Cerber has encrypted some of the files of the victim, it demands the payment of a ransom (usually by Bitcoin) in exchange for the decryption key. According to Cerber Ransomware’s ransom note, computer users have one week to pay the ransom amount before this amount is doubled.

Cerber’s sole reason for existence is to extort money illicitly from you and your business. The creators of Cerber have designed it to work as a business model for cybercriminals and is also available as a Ransomware as a Service (RaaS). What this means is that it is readily available to cybercriminals who may have little or no coding knowledge but simply a means to distribute it. What’s more, the malware features military-grade encryption, offline encrypting, and various other features that makes it attractive to the cybercriminals.

In February, we posted an article entitled Ransomware: Common Bad Practices Are Your Biggest Threat”. In this article, we suggested a guide, we call C.U.B.E, detailing some of the steps you should take to mitigate you chances of attack.

  1. Communicate: with employees to develop a strategy to inform employees if a virus reaches the company network.
  2. Update: all software, including operating systems, antivirus software and all other applications.
  3. Back Up: all information every day, including information on employee devices, so you can restore encrypted data if attacked. It is strongly advised that you use an online backup service.
  4. Educate: staff on cyber security practices, emphasising not opening attachments or links from unknown sources.

No matter what anybody tells you, there simply is no sure-fire way to guarantee that you won’t be the victim of a ransomware attack. What you can do however is backup your data online. Online backup ensures that, should you fall victim to an attack you have a means of restoring your data quickly to guarantee, the continuity of your business. Please read our article on “Online Backup V Online Storage” for further information.

Unfortunately, ransomware is here to stay and the more we rely on the internet, the more likely we are to fall victim to cybercriminals. As I’ve said, neither IT.ie nor any IT support company can guarantee that you won’t fall victim to attack. What we can do is advise you and support you with the very latest weapons available to fight cybercrime. I strongly urge you to implement the C.U.B.E system and if you don’t already have online backup, get it now!




Web Browsing at Work – Is it Secure?

To the Cyber-criminal, your browser is their gateway to your personnel information. There is a treasure trove of information available on your browser, be it credit card details, emails, browsing history, passwords, bank details etc. You can never be 100% secure when browsing the web. There are however several common-sense steps you can take

2017-05-02T12:53:10+00:00 April 29th, 2017|Data Protection, Ransomware, Security, Virus|Comments Off on Web Browsing at Work – Is it Secure?

Online Backup v Online Storage

It can be tricky understand the difference between online backup services vs cloud storage service. Both services effectively store your information in the cloud but offer a very different feature set. Knowing the difference between the two is vital to helping you understand what you can expect when you look to the cloud for

2017-04-14T17:25:10+00:00 March 1st, 2017|Ransomware, Scams, Security, Virus|Comments Off on Online Backup v Online Storage

RANSOMWARE: Common Bad Practices Are Your Biggest Threat

    2016 was without doubt, the year where ransomware became a real threat to business’s worldwide. Ireland has not escaped the reach of global cybercriminals. Dell EMC has described it as one of the biggest cyber threats ever, to both SME’s and large multinationals. Unlike phishing, up 115% in the second quarter of

2017-04-14T17:26:48+00:00 February 9th, 2017|Ransomware, Scams, Security, Uncategorized, Virus|Comments Off on RANSOMWARE: Common Bad Practices Are Your Biggest Threat