The attack comes through a trustworthy looking email that appears to be part of a dialogue that is taking place. An employee opens the attachment and the employer gets caught by the blackmailer. This is happening to more and more companies and public institutions. You will then either have to completely redesign your IT or pay a ransom.
The Fake Emails
The fake email becomes criminals favorite tool to directly defraud companies or prepare for major cyberattacks. This is shown by the loss statistics. BEC stands for Business E-Mail Compromise or fraudulent business e-mail, often the term phishing e-mail is also used. Statistics for 2020 are not yet available, but the trend continues
On the one hand, emails are used to inject malicious programs such as Emotet. In many cases, criminals take a different path. They are often sent to people who are responsible for transferring payments. The cyber criminals pretend to be a manager of a company or a supplier and require remittances, tax documents and other sensitive data.
Companies Should Train Employees To Backup Copies Of Their Data
Today, many attackers are preparing for the action, collecting information about the company and carefully selecting the target persons. They also know what they’re looking for. The damage can be significant even with minor attacks. The company is well positioned and quickly discovered for the damage. Now they want to make sure that they really cleaned everything and use specialists to do it. Specialists expect the number of cyber damages in the industrial segment to continue to increase. Ransom and extortion attacks are becoming more targeted, the attackers are better, and the sums paid are higher. A backup copy is no longer enough; today there should be several backups created and stored independently of one another.