Ransomware targets backup data | Inquirer Business

Ransomware targets backup data

/ 04:02 AM December 09, 2019

Kaspersky researchers have identified a new type of ransomware attack that is targeting network-attached storage (NAS), posing new risks for backup data usually stored on such devices.

With NAS largely perceived as a secure technology, users often remain unprepared for the possibility of infection, putting their data at higher risk. Encryption ransomware is a malware that applies advanced encryption methods so files cannot be decrypted without a unique key. This leaves the infected device owner stuck with a locked device and a demand to pay a ransom in order to regain access to files. While users are typically infected with ransomware via email or exploit kits planted on websites, the new type of attacks on NAS devices use a different vector.

Although only web interfaces protected with authentication are accessible, a number of devices have integrated software with vulnerabilities in it. This allows the attackers to install a Trojan using exploits, which will then encrypt all data on the devices connected to the NAS. ‍‍

“This year alone we have already detected a number of new ransomware families focused solely on NAS. This trend is unlikely to fade, as this attack vector proves to be very profitable for the attackers,” said Fedor Sinitsyn, security researcher at Kaspersky.‍

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TAGS: Business, ransomware

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our newsletter!

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

This is an information message

We use cookies to enhance your experience. By continuing, you agree to our use of cookies. Learn more here.