Uncategorized

Ransomware Threat Called #1 Growing Security Threat on Manhattan Chamber of Commerce Program

eMazzanti Technologies CEO, Carl Mazzanti discusses nature and persistence of ransomware threat on blogtalkradio broadcast

Manhattan Chamber of Commerce RansomwareManhattan Chamber of Commerce RansomwareHoboken, New Jersey ­- (Cision) June 24, 2016 — A NYC area IT security expert and eMazzanti Technologies CEO, Carl Mazzanti, discussed the topic of the ransomware threat on a June 15, 2016 blogtalkradio business program sponsored by the Manhattan Chamber of Commerce, calling ransomware the number one growing security threat.

In the interview, Mazzanti discussed the nature and persistence of the ransomware threat. How infections occur and methods to prevent them, including education and IT security tools, were explained in response to questions asked by program host, Bruce Hurwitz. Anyone interested in the topic can listen to the recorded program online.

“Ransomware is the #1 growing IT security threat because people are making money,” stated Mazzanti. “It’s a business run by criminals who hold data hostage for money. They are smart enough to get some percentage of people to open a ransomware trigger.”

Ransomware Threat Behavior

  • Criminals almost always use a file as a trigger that may sit idle for long periods until activated. Antivirus products are not very effective against ransomware.
  • Ransomware is often acquired through drive-by downloads from a website or by opening a harmless looking email attachment. The subject line might be something as simple as ‘Invoice’. An accounts payable person may open the attachment because it’s their job.
  • When the trigger file is opened, it makes a call to open or download something else that encrypts data on the computer and requests the ransom.
  • If the individual or organization doesn’t have backups, they may be obliged to pay the ransom. Even when the infected machine is rebuilt using backup files, the trigger may still be sitting in the same infected file. Unless something changes, the file lock-up will happen again.

“People call eMazzanti after getting get hit. Then they’re hit again a month or two later,” related Mazzanti. “In the instances when the ransom is paid and the files are decrypted, that computer can turn into a dissemination point to other networks. Then the firm that last paid the ransomware is often hit again.”

Mazzanti explained how ‘sandboxing’ is a way to determine which files are triggers. For example, WatchGuard Technology’s Advanced Persistent Threat data security tool uploads and executes files in question and blocks or lets them pass through.

Strategies for preventing ransomware threat infections

  • Educating users about ransomware is essential.
  • Often, they can easily detect a malicious website by looking at the URL in the link.
  • Users should look for misspelled names or poor link formatting.
  • They should carefully check email addresses that tip off disguised or fraudulent messages.
  • If they don’t know the sender of an email, they should delete it.
  • Employees should know who the business is contracting with and not open email attachments from others.
  • There are a number of security tools that may or may not help prevent ransomware infections.

Responding to a question from host, Bruce Hurwitz, Mazzanti explained that everything connected to a network is a potential point of access for a ransomware threat. A common way is through USB keys, often left on the sidewalk.

Pedestrians pick up the USB key and seem compelled to plug it into their computer to investigate. One company did a similar thing as a training exercise to show employees how they just compromised the system.

People handing out music CDs or DVDs are a simple ransomware dissemination point.* “You’ll see it with Times Square musicians who say, ‘Take my CD,’” Mazzanti related. “Most people will take it. It’s just a matter of time before they put it in their computer.”

What to do if you are the victim of a ransomware attack:

  • Call a data security professional for assistance.
  • Contain the breach as quickly as possible.
  • Recover to a state where you can operate.
  • Put preventative measures in place as quickly as possible to prevent a repeat attack.

The program concluded with a warning that if an organization is hit by ransomware, there is a high probability that it will happen again. As long as there is a way that criminals can profit, they are a target.

*NOTE: see the Show “Mr. Robot” about how he does this same exact technigue to attack a machine: https://en.wikipedia.org/wiki/Social_engineering_(security)

Download Ransomware Blogtalkradio PDF

Cloud Services New York City

Recent Posts

Step Up Your Threat Response With Security Copilot

As we move deeper into 2025, you are probably focusing on ways to expand your…

6 days ago

Watch Out for the Cyber Security Menace

As we move deeper into 2025, you are probably focusing on ways to expand your…

6 days ago

The Rise of AI Agents: Simplifying Tasks and Connecting Technologies

Introducing eCare Bot: Your Intelligent IT Support Assistant  In today's fast-paced world, the emergence of…

1 week ago

Server Simplified

At eMazzanti Technologies, we recognize that stable, effective, and expandable servers are essential to the seamless operation of enterprises. For this reason, we collaborate with Hewlett Packard Enterprise (HPE) to offer our clients the best server solutions possible, customized to meet their unique requirements. HPE servers provide the performance and  flexibility required for small and big businesses to manage data, support apps, and manage             workloads with ease. Customers may choose the best HPE servers for their organization with the assistance of our team of specialists. We take the time to comprehend the particular needs of every client, including those related to processing speed, storage capacity, and security features. Whether our clients require a general-purpose ProLiant server or a…

2 weeks ago

How to Make Your AI Copy Sound Authentic: Writing Like a Human, Not a Machine

AI writing tools have become popular for creating content quickly. But many readers can spot…

2 weeks ago

Data Analytics for Old-School Business Owners: Turning Dusty Ledgers into Gold Mines

Data analytics is changing the game for businesses of all types, including old-school industries that…

2 weeks ago