• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Greg Young
    • Mark Nunnikhoven
    • Jon Clay
    • William “Bill” Malik
  • Research
Home   »   Business   »   Defending against Crypto-Ransomware Threats

Defending against Crypto-Ransomware Threats

  • Posted on:September 15, 2015
  • Posted in:Business, Malware, Security, Small Business
  • Posted by:
    Richard Medugno
0

Crypto-ransomware is a growing crime problem for everyone who uses the Internet – including small businesses, of course.

You’ve probably heard about this form of malware before, but as a reminder, it tricks you into downloading the ransomware onto your PC via spam with links that take you to a fake website that often looks like a real website of a bank or government agency.

When you unknowingly download the malware onto your system by doing some innocuous task like entering a CAPTCHA (a program that protects against bots) passcode, the ransomware immediately encrypts your files, preventing you from accessing them, and then demands that you pay a ransom, usually in bitcoins, to decrypt the files.

In short, as Daniel Dunkel of crypto-ransomware states in his Simply Security blog, “It’s kidnapping information and extorting money from the vulnerable, technology-dependent citizens of society.”

The Best Way to Avoid Ransomware

Backing up your important files is part of a good anti-ransomware strategy in case this happens to you or someone on your staff.  Additionally, Trend Micro has a ransomware cleanup tool to use if you want to get rid of the offending malware. However, the best way to avoid the wasted time and aggravation that comes with a crypto-ransomware attack is to be protected by solutions like Trend Micro™ Worry-Free™ Business Security.

For years, we have been expanding our security beyond simple signature-based malware detection, though we still block over 1.4 billion malicious items per month using this technique. Today, we employ behavioral monitoring techniques with enhancements to detect, prevent, and clean ransomware before it can do any damage to our customers’ files.

Here are some of the ways our solutions safeguard customers from crypto-ransomware:

  • Leverage Trend Micro’s Web Reputation Service to protect against malicious links
  • Leave known good processes in place (based on a cloud whitelist and local exception list) to avoid false-positives
  • Scan with our existing security to identify recognizable malware (at the file level with signature or smaller fragments based on unpacking/memory inspection)
  • Flag suspicious items that are unknown based on data from the Trend Micro™ Smart Protection Network™ infrastructure
  • Look for patterns of unusual or malicious activity, especially where unknown applications are encrypting or modifying files
  • Terminate and quarantine the process of any detected ransomware activity, dramatically limiting encryption and/or loss of data

Related posts:

  1. Combatting Ransomware with Trend Micro Endpoint Solutions: New Capabilities
  2. Fighting Ransomware with Trend Micro Security 10 and the Trend Micro Anti-Ransomware Tool
  3. Crypto-Ransomware Attacks: The New Form of Kidnapping
  4. Crypto-ransomware, A Growing Threat to Healthcare

Security Intelligence Blog

  • Our New Blog
  • How Unsecure gRPC Implementations Can Compromise APIs, Applications
  • XCSSET Mac Malware: Infects Xcode Projects, Performs UXSS Attack on Safari, Other Browsers, Leverages Zero-day Exploits

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • Ransomware is Still a Blight on Business
Greg Young (Vice President for Cybersecurity)
Greg Young (Vice President for Cybersecurity)
  • Not Just Good Security Products, But a Good Partner
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Ransomware Gang is Raking in Tens of Millions of Dollars and Microsoft Patch Tuesday Update Fixes 17 Critical Bugs
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Twitter Hacked in Bitcoin Scam
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • The Sky Has Already Fallen (you just haven’t seen the alert yet)
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • Black Hat Trip Report – Trend Micro

Follow Us

Trend Micro In The News

  • Advanced Cloud-Native Container Security Added to Trend Micro's Cloud One Services Platform
  • Trend Micro Goes Global to Find Entrepreneurs Set to Unlock the Smart Connected World
  • Winners of Trend Micro Global Capture the Flag Demonstrate Excellence in Cybersecurity
  • Companies Leveraging AWS Well-Architected Reviews Now Benefit from Security Innovations from Trend Micro
  • Trend Micro Announces World's First Cloud-Native File Storage Security
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.