The International Counter Ransomware Initiative (ICRI) has the backing and support of 40 countries from around the globe, to refuse any form of payment to cyber criminals, in an effort to combat the growing menace of ransomware attacks.
This blog was originally published to the website of CNC, who are now the Brighton branch of FluidOne.
Ransomware attacks are the number one tool used by cyber criminals to steal money and data, which creates havoc upon the social apparatus of society. The ICRI is a US-led alliances that includes the EU, Japan, Israel, the United Arab Emirates, the UK and Singapore to name but a few, aiming to stop the practice of ransomware crime.
Government agencies are at the brunt of such attacks, health care providers, schools, local authorities and critical social infrastructure departments. The ICRI is a shared response to a common problem felt by countries all around the world. The alliance is the first major attempt at protecting public safety and essential services.
With ransomware attacks up by 148% since 2021, it is not stopped by borders. The US is, by far, the hardest hit of all, receiving 50% of all ransomware attacks. Having 40 countries join forces together to respond and mitigate, will create a global resilience to the threat.
Typically, in a ransomware attack, cybercriminals will break into a network and place an encryption key on the system, thereby locking the user out, denying the business or government agency access to files held on their system, until a ransom payment is made.
Sadly, if a organisation has not battened down all of its networks and is then been held to ransom by cybercriminals, historically, it’s been the practice that is easier for them to pay the ransom, than to suffer prolonged operational shutdown, as well as the reputational damage that follows after such an attack. The problem however, with this strategy, is that there is no way of knowing whether the cybercriminals have left your network, only to hold you to ransom later down the road. That is until now.
Socially engineered messages are clever, very clever, so your business should be hyper-vigilant as to what you allow in. Training and constant education will reduce your exposure to an attack.
With 2FA or MFA, you’ll need to provide a second element of proof, like Microsoft’s Authenticator App, a fingerprint, facial recognition, or something else that says you are really who you say you are digitally.
However, there are inherent vulnerabilities in using RDP, and cybercriminals look to exploit these with weapons like port targeting, smart card hijacking, or Distributed Denial of Service attacks (DDoS). So, using strong secure passwords, two-factor authentication and up-to-date patching, will help prevent these problems.
At CNC, we can help you reduce the attack surfaces of your business. Call us now on 01273 384 100 for more information.
CNC – helping you to protect your business.
Gary has always focused on making sure the most appropriate solution is provided to help customers, not just what's new and shiny.
With over 30 years in the IT industry Gary has the experience to tell the difference between something that's game-changing or is just a passing fad!