https://www.channelfutures.com/wp-content/themes/channelfutures_child/assets/images/logo/footer-new-logo.png
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
Channel Futures
  • NEWSLETTER
  • Home
  • Technologies
    • Back
    • SDN/SD-WAN
    • Cloud
    • RMM/PSA
    • Security
    • Telephony/UC/Collaboration
    • Cable
    • Mobility & Wireless
    • Fiber/Ethernet
    • Data Centers
    • Backup & Disaster Recovery
    • IoT
    • Desktop
    • Artificial Intelligence
    • Analytics
  • Strategy
    • Back
    • Mergers and Acquisitions
    • Channel Research
    • Business Models
    • Distribution
    • Technology Solutions Brokerages
    • Sales & Marketing
    • Best Practices
    • Vertical Markets
    • Regulation & Compliance
  • MSP 501
    • Back
    • 2022 MSP 501 Rankings
    • 2022 NextGen 101 Rankings
  • Intelligence
    • Back
    • Galleries
    • Podcasts
    • From the Industry
    • Reports/Digital Issues
    • Webinars
    • White Papers
  • Channel Futures TV
  • EMEA
  • Channel Chatter
    • Back
    • People on the Move
    • New/Changing Channel Programs
    • New Products & Services
    • Industry Honors
  • Resources
    • Back
    • Advisory Boards
    • Industry Organizations
    • Our Sponsors
    • Advertise
    • 2022 Editorial Calendar
  • Awards
    • Back
    • 2022 MSP 501
    • Channel Influencers
    • Circle of Excellence
    • DE&I 101
    • Channel Partners 101 (CP 101)
  • Events
    • Back
    • CP Conference & Expo
    • MSP Summit
    • Channel Partners Europe
    • Channel Partners Event Coverage
    • Webinars
    • Industry Events
  • About Us
  • DE&I
    • Newsletter
  • REGISTER
  • MSPs
  • VARs / SIs
  • Agents
  • Cloud Service Providers
  • Channel Partners Events
 Channel Futures

Content Resources


Why Ransomware Attackers Really, Really Like Cloud Computing

  • Written by Charles Cooper 1
  • October 26, 2016
Ransomware attacks haven’t crippled victims - yet. But it’s only a matter of time before a major attack takes place. Before the big one hits, MSPs should push their clients to take proper defensive measures.

Earlier this year, a ransomware attack shut down the Lincolnshire County Council’s computer systems. For a week, members were reduced to using pens and pencils after the council refused to pay the $500 ransom demanded by the attackers.

It was a vivid example of the disruption that ransomware can cause security executives, who are girding to contend with targeted ransomware attacks against current and planned cloud deployments.

No surprise there as malicious hackers, clearly creatures of habit, seek out the most promising targets. While the cloud has proven its security critics wrong up until now – it’s actually a lot more secure than many thought a few years ago  – targeted ransomware attacks against the cloud are on the increase.

And the bad guys continue to demonstrate how easily it is to outwit their targets by using social engineering ruses. Despite repeated entreaties from IT departments to treat emailed links with caution, employees continue to ignore warnings and click on emails containing infected links. When the links include ransomware, the results can be especially dire.

As ransomware spreads through a network, it locks up data and applications, encrypting the information until organizations pay off the attackers. The resulting down time and the damage to reputation are even more expensive than the ransom they get forced to pay.

Cloudy landscape

The threat is expected to increase with the spread of plug-and-play tools and services, further complicating an already complex cloud security landscape.

For example, security company Trend Micro tracked the recent progress of a malware variant called Cerber that specifically targets users of Microsoft 365. The danger it poses is compounded by its ubiquity; indeed, Cerber is a white-label malware strain that can be marketed to other enterprising malicious hackers. Similarly, another crimeware-as-a-service product called Ransom32 also allows cybercriminals to launch their own ransomware campaigns.

Phishing threats are not the only challenge for IT security. Researchers have also spotted attackers who spread malware through IT-approved cloud-based applications such as Dropbox by uploading infected files to the cloud service, which then get shared by other users. 

Cloud security provider Netskope took a look recently at the distribution of cloud malware attacks and offered the following statistical snapshot.

  • Enterprises used an average of 977 cloud apps compared to 935 last quarter.
  • 56% of malware-infected files discovered in sanctioned cloud apps get shared with internal or external users, or shared publicly.
  • 44% of cloud malware types make up the most common delivery vehicles for ransomware. These include Javascript exploits and droppers, Microsoft Office macros, and PDF exploits.

Apres moi, le deluge?

Managed service providers can help clarify the rules of the road for clients who might be new to the cloud. Security still poses the No 1 threat to cloud adoption and successful migrations depends on taking the right steps to either block or slow attacks.

At a minimum, MSPs should insist that IT establish a traditional firewall with a full complement of defensive measures, such as a VPN equipped with anti-virus and data loss prevention tools in order to block ransomware infections and prevent against data being accidentally exfiltrated. Organizations should also make good sets of data backups so they have a robust recovery capability in the event of an attack. That would give IT the option of refusing to pay the extortion because they’ve backed up their information.

So far, attackers have not pulled off a spectacular ransomware attack against a company cloud. Don’t read too much into that. The security threat to the Internet of Things was largely theoretical until the recent Distributed Denial of Service against DNS provider Dyn proved otherwise. 

This content is underwritten by VMware — and is editorially independent. It is produced in accordance with conventional standards of business journalism.

Charles Cooper is an award-winning freelance author who writes about business and technology. During his 30-plus year career, he has worked as an executive editor at several leading tech publications including CNET, ZDNet, PC Week and Computer Shopper.

 

 

Tags: Agents Cloud Service Providers MSPs VARs/SIs Content Resources

Most Recent


  • secure
    Work Goes Remote - (and Other Top ITOps Trends)
    Remote work is perhaps the most obvious trend for 2022. But other key trends affecting your clients include gaining buy-in from their existing IT staff, improving security for better compliance, using MSPs to supplement staffing needs, deploying in the cloud, and paying attention to human factors. Download this whitepaper to  look at each of these […]
  • The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses
    There has not been, in modern memory, a harder time to work in healthcare. Whether on the front lines or in the back office, doctors, nurses, their assistants, administrative personnel, and others handle more responsibilities and changes than ever. The healthcare industry is experiencing a record exodus of experts and soaring cases of burnout – […]
  • Code against data center background
    How to build a Security Operations Center (on a budget)
    Whether you’re protecting a bank or the local grocery store, certain common sense security rules apply. At the very least, you need locks on entrances and exits, cash registers, and vaults as well as cameras pointed at these places and others throughout the facility. The same goes for your cloud, on-premises, and hybrid environments. Controlling […]
  • threat hunters
    The AT&T Cybersecurity Incident Response Toolkit
    When it comes to data breaches, most agree that it’s not a matter of if, but when. In CyberEdge Group’s 2019 Cyberthreat Defense Report, an astounding 78% of surveyed organizations admitted being victims of cyber attacks. That’s why it’s important to have the right incident response tools and plans in place. In this paper, you’ll […]

Leave a comment Cancel reply

-or-

Log in with your Channel Futures account

Alternatively, post a comment by completing the form below:

Your email address will not be published. Required fields are marked *

Related Content

  • 5G security challenges
    5 Questions Your Customers Should Ask When Planning to Migrate to 5G
  • Service edge
    A Quantitative Comparison of UPS Monitoring and Servicing Approaches Across Edge Environments
  • Hybrid cloud administrators should define management policies procedures and job responsibilities to eliminate ambiguity and ensure theyrsquove created the most secure environment possible Establish clear rules governing cloud configuration and installation access control for sensitive data or restricted applications and reporting guidelines Identify and document what crossplatform tools are authorized as well as the access controls and encryption standards are in placenbsp
    RISK-BASED AUTHENTICATION: A Critical Element to Any Zero-Trust Deployment
  • Firewall
    6 Essential Features of a Modern Firewall

Upcoming Events

View all

MSP Summit

September 13, 2022 - September 16, 2022

Channel Partners Conference & Expo

May 1, 2023 - May 4, 2023

Galleries

View all

The Gately Report: Black Hat USA Edition with Cisco, IBM, CISA, More

August 12, 2022

7 Channel People Making Waves This Week at Microsoft, Rackspace, RingCentral, Avaya

August 12, 2022

Oracle Cloud & AT&T, AWS Lead Cloud News Roundup

August 12, 2022

Industry Perspectives

View all

How to Take Shared Responsibility for Securing Cloud

August 11, 2022

Seize the Application Modernization Opportunity

August 2, 2022

A Growth Mindset: Your Organization’s Strategic Differentiator

August 1, 2022

Webinars

View all

Outsmarting RaaS: Implementation Strategies To Help Your Clients Before, During, and After a Ransomware Attack

August 23, 2022

Why it is Important to Upgrade Aging Servers and How to use Live Optics to Upgrade Efficiently

August 25, 2022

Executives at Home are Not Alright: An Intro to Digital Executive Protection

September 8, 2022

White Papers

View all

Work Goes Remote – (and Other Top ITOps Trends)

May 25, 2022

The New Bottom Line: How MSPs Can Meet the Healthcare Crisis While Evolving Their Businesses

April 19, 2022

How to build a Security Operations Center (on a budget)

April 4, 2022

Channel Futures TV

View all

ThreatLocker Preaches Zero Trust, Addresses Industry Competition

ScienceLogic Debuts New Partner Portal

August 9, 2022

Vonage a ‘Single Communications Stack Provider’ for Partners, Customers

June 27, 2022

IBM, Partners and the $1 Trillion Hybrid Cloud Opportunity

June 26, 2022

Twitter

ChannelFutures

.@splunk vet Bill Hustad named @Okta's new #channelchief. dlvr.it/SWXmws https://t.co/ILQesul0Cz

August 12, 2022
ChannelFutures

The Gately Report: #BHUSA edition with @Hacker0x01, @Cisco, @SaltSecurity, @CISAgov, @ExtraHop, @IBMSecurity, more.… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Channel People Making Waves Include: @kencarnesi, @szebenisz, @vasujakkal, @brettsmith52, @DaveMichels… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Nancy Henriquez, VP of Sales & Marketing at MSP 501 award-winning @synetek, touches on the importance of gathering… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

.@Equinix's new hire is a familiar face in the telco channel. dlvr.it/SWXV6v https://t.co/jIg0LrZ4DO

August 12, 2022
ChannelFutures

Missed the news this week from @OracleCloud and @ATTBusiness? We've got it here. Plus, news from @AWSCloud and… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Huge channel-impacting acquisitions in the past month. We've got details on @IBM, @nokia, @GoTo, @EnsonoIT,… twitter.com/i/web/status/1…

August 12, 2022
ChannelFutures

Boost privacy by design with #shiftleft mindset and add #security to cloud deployments from start, says… twitter.com/i/web/status/1…

August 12, 2022

MSP 501

The industry's largest and most comprehensive partner awards program.

Newsletters and Updates

Sign up for The Channel Report, Channel Futures Update, MSP 501 Newsletter and more.

Live Channel Events

Get the latest information on the next industry-leading Channel Partners event.

Galleries

Educational slide shows and images from live events.

Media Kit And Advertising

Want to reach our audience? Access our media kit.

DISCOVER MORE FROM INFORMA TECH

  • Channel Partners Events
  • Telecoms.com
  • MSP 501
  • Black Hat
  • IoT World Today
  • Omdia

WORKING WITH US

  • Contact
  • About Us
  • Advertise
  • Newsletter

FOLLOW Channel Futures ON SOCIAL

  • Privacy
  • CCPA: “Do Not Sell My Data”
  • Cookie Policy
  • Terms
Copyright © 2022 Informa PLC. Informa PLC is registered in England and Wales with company number 8860726 whose registered and Head office is 5 Howick Place, London, SW1P 1WG.
This website uses cookies, including third party ones, to allow for analysis of how people use our website in order to improve your experience and our services. By continuing to use our website, you agree to the use of such cookies. Click here for more information on our Cookie Policy and Privacy Policy.
X