Asia Fresh News

Asia Fresh Stories

ESET Experts Share Three Key Insights on Ransomware

leave a comment »

SINGAPORE/PRNewswire/ — ESET experts, Stephen Cobb, David Harley and Lysa Myers have shared three key insights on ransomware. 2017 has arrived before people even realized it was coming and it’s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016.

Before people entangle themselves in everything digital that this year has to offer, it’s important to heed expert advice. Take ransomware — what does it really entail and will it vanish as quickly as it appeared? One thing’s for sure: Ransomware isn’t going anywhere. As recently reported, cybercrime has wriggled its way into 21st century life, wreaking a trail of havoc as it goes. Ransomware is attacking our hospitals, our libraries and our financial institutions. It’s attacking the trendy new connected cars. As ESET’s Stephen Cobb envisions, what if it sets its sights on Internet of Things (IoT) devices?

Here are the rounded up key advice and insight ESET experts have provided within the last year.

RoT: Ransomware of Things

Stephen Cobb, senior security researcher at ESET

Golden rule: Don’t put anything on the internet you wouldn’t want your mother to see.

Cobb warns of the impact of a yet unknown concept. His concern is that “malicious software that seeks to take control of a device” — or “jackware”, as he calls it — may infiltrate 2017.

During midwinter in 2016 in Finland, where temperatures were below freezing, cybercriminals were able to take control and halt the heating of two buildings during a distributed denial of service attack. Could these attacks become commonplace as the IoT continues to flourish?

Cobb believes there needs to be a collective international effort made, on both a technical and political level, to stop the IoT giving way to the RoT. “Traditional security techniques like filtering, encrypting, and authenticating can consume costly processing power and bandwidth,” he pointed out. “There has been a collective international failure to prevent a thriving criminal infrastructure evolving in cyberspace.”

The good news is people are not falling for anything they are not sure about. Cobb cites a report from a survey showing that more than 40% of American adults remain unconvinced that IoT devices are safe.

He questions: “Could the combination of consumer sentiment and government guidance lead companies to make the IoT more resistant to abuse?”

Ransomware: should you pay up?

David Harley, senior research fellow at ESET

Golden rule: Scepticism is a survival trait: don’t assume that anything you read online is gospel truth, even in this adage.

To pay (cybercriminals demanding a bitcoin ransom), or not to pay, that is the question.

Such is the current state of the modern world.

On the morality of paying a ransom to cybercriminals who’ve attacked your system and encrypted your data, there’s a multitude of opinions around. “There’s an undeniable argument that if you give in and pay the ransom, you’ve directly contributed to the wellbeing of criminality,” concedes David Harley. “And there’s unlikely to be a money-back guarantee.”

However, he recognizes that often it’s not that straightforward: “In many cases, it’s cheaper to pay up than lose the data … Maybe the damage is so severe that you go out of business. You can’t blame companies if they decide to pay up rather than commit financial suicide.

“It might be seen as being more responsible to pay up rather than destroy the livelihoods of all staff.”

His own personal advice is that “prevention (and backup) is worth a ton of Bitcoins”.

Whatever your stance on the issue, the solution remains to follow the advice of experts such as Harley himself, and Lysa Myers.

What can you do about ransomware?

Lysa Myers, security researcher at ESET

Golden rule: An ounce of prevention is worth a pound of cure.

“If you have properly prepared your system,” says Myers, “[ransomware] is really nothing more than a nuisance.”

ESET selected five precautions Myers has advised taking, by means of the aforementioned prevention.

1.       Back up your data — on an external drive that is disconnected from your devices and network when not in use

  • This is the single most important thing you can do.

2.       Keep your software up to date

  • Use reputable software repositories for both anti-malware software and a software firewall.

3.       Disable macros in Microsoft Office files

  • By doing so, you deactivate the use of the scripting language used by malware.

4.       Display hidden file extensions — and look for double extensions

  • Windows and OSX hide known file extensions. Malware takes advantage of this.

5.       Filter EXE files in email; and disable RDP and files running from AppData / LocalAppData folders

  • Behaviour used by ransomware often manifests itself in the above.

Ransomware “can be extremely scary”, but it can be tackled with education and awareness. Myers ends on a positive note: “If anything good can come out of this ransomware trend, it is an understanding of the importance of performing regular, frequent backups to protect our valuable data.”

About ESET

For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint and mobile security, to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give consumers and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real-time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D centers worldwide, ESET becomes the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003. For more information visit or follow us on LinkedInFacebook and Twitter.

Source: ESET

Written by asiafreshnews

February 9, 2017 at 4:29 pm

Posted in Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: