A spreading threat
Ransomware attacks have become increasingly common, thanks to the creativity and technical savvy of the attackers.
Bad actors often use stolen credentials to gain access to a network to wreak their havoc on both individuals and organizations. Weak credentials, such as simple passwords used for multiple accounts, make it easy for hackers to access someone’s accounts or systems. Lost or stolen devices, especially those that are left unlocked and unencrypted, also provide scammers with an entry point.
Another extremely common way for ransomware to infiltrate a computer is through phishing emails. In this kind of attack, scammers send official-looking emails or texts to individuals, encouraging them to click on a link or open an attachment.
These communications may look like they’re really from the recipient’s bank, credit card company or other legitimate entity, when they’re simply Trojan horses for ransomware. When the unsuspecting party clicks on a link or downloads the attachment, malware infects their computer, and the damage begins.