A very interesting article came across the wire recently that had us wondering how the measure of success has seemingly changed recently; especially as it pertains to preventing malware and, in particular, ransomware. ZDNet posted an article outlining how Blackbaud, one of the world’s largest providers of financial and fundraising technology for non-profits, had been hacked. In this case, Blackbaud’s security team was able to detect and “successfully” prevent the blocking of system access for users as well as prevent the encryption of their files. However, as is the case now with ransomware groups, they tend to pursue two avenues for extracting ransom; either for decrypting files, or in the case where the victim refuse to pay and intend on rebuilding their systems from scratch, the hackers will demand a ransom for NOT publishing the data that they have accessed and exfiltrated. Unfortunately, the attack on Blackbaud was a prime example of “today’s double-extortion ransomware attacks”. Blackbaud, concerned that a subset of their data had been stolen by the hackers, and not wanting this data to be published, still ended up paying an undisclosed amount in order to ensure that the hackers confirmed that the data they copied had been removed or destroyed. So, although there was a measure of success by the company’s security team to prevent encryption and lock-up of their systems, this “success” is questionable since they still had to pay out a ransom.
And so, this is the reality for organizations when it comes to their network security; a single attack can provide several avenues for hackers to extort their ransom. In some cases, these nefarious groups will actually double-dip; requesting one fee for decrypting files and ANOTHER fee for deleting the files that they were able to steal during the attack. Either way, we feel that having to pay any sort of ransom does not count as successfully thwarting a ransomware attack. In any case where a hacker has been able to successfully gain access to a network, it is a failure of the Detect and Remediate methodology that so many companies still utilize. We feel that the only real “success” would be the case where an attack has been Detected and Blocked, BEFORE any network incursion has taken place.
At Wedge, we are firm believers that the Detect and Block approach is the only true way that networks can be protected. There are just too many consequences that organizations face once their network has been breached. The Real-time malware prevention approach is the basis behind Wedge’s Absolute Real-time Protection (WedgeARP) orchestrated threat management platform. Using a proactive, rather than reactive, way of dealing with all malware (including APT, zero days, known and never-before-seen), WedgeARP utilizes patented Deep Content Inspection techniques, along with orchestrated threat management with multiple layers of protection, to provide its real-time threat protection. WedgeARP is the first and only platform that applies deep learning / machine learning based threat detection to network content.
If you feel that the only true measure of success in dealing with malware and ransomware attacks is by having your network fully protected and by NOT having to pay ransom, you may want to look at the Detect and Block approach that Wedge Networks espouses. Find our more by contacting our team at: info@wedgenetworks.com. Having a real-time orchestrated threat management system that can successfully detect and BLOCK attacks before they happen can save your organization time and money by not having to deal with the clean-up efforts that a Detect and Remediate approach requires.
Main Website Links
Wedge DCI Search
Wedge Calendar
-
Recent Posts
- Wedge Networks Announces General Availability of its Innovative, Continuous Learning Analytics and Threat Intelligence Engine, WedgeIQ™ Nucleation Edition at Asia Tech Singapore
- Wedge Networks Teams up with Edgecore Networks to Offer Next-Generation Network Security WedgeCND™ Add-on Now Available on Edgecore ecCLOUD
- Wedge Networks to Participate at Mobile World Congress 2023
- Wedge Networks to Showcase Latest Innovation In Real-time Threat Prevention, WedgeIQ™ Nucleation Release, at WEST Conference in San Diego February 14-16th
- Wedge Networks Partners with Seaspring to Deliver Real-time Threat Prevention to the Bahrain & MENA Markets
Recent Comments
- Ram Bathala on Calgary’s Wedge Networks Looks to Channel for Enterprise Push with Malware-Blocking Product
- Eva on Milliseconds Versus Minutes – The Difference Between Prevention and Remediation
- Smithb on Wedge Adds AI for Better Malware Blocking
- Abram on Wedge Joins MEF to Boost World’s Third Network Security
- David Millar on 5G & IoT Dominate MWC16
Archives
- June 2023
- May 2023
- February 2023
- January 2023
- November 2022
- September 2022
- August 2022
- July 2022
- June 2022
- March 2022
- February 2022
- January 2022
- December 2021
- November 2021
- September 2021
- June 2021
- May 2021
- April 2021
- March 2021
- February 2021
- January 2021
- December 2020
- November 2020
- October 2020
- September 2020
- August 2020
- July 2020
- June 2020
- May 2020
- April 2020
- March 2020
- February 2020
- January 2020
- October 2019
- August 2019
- July 2019
- June 2019
- May 2019
- April 2019
- March 2019
- February 2019
- January 2019
- October 2018
- September 2018
- August 2018
- July 2018
- June 2018
- March 2018
- February 2018
- July 2017
- June 2017
- May 2017
- April 2017
- February 2017
- November 2016
- October 2016
- September 2016
- May 2016
- April 2016
- March 2016
- February 2016
- December 2015
- November 2015
- October 2015
- September 2015
- August 2015
- June 2015
- May 2015
- April 2015
- March 2015
- December 2014
- November 2014
- October 2014
- April 2014
- March 2014
- February 2014
- January 2014
- December 2013
- November 2013
- October 2013
- April 2013
- November 2012
- October 2012
- September 2012
- June 2012
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- November 2011
- June 2011
- May 2011
- February 2011
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
Categories
Meta
Kaspersky ThreatPost
- Student Loan Breach Exposes 2.5M Records August 31, 2022
- Watering Hole Attacks Push ScanBox Keylogger August 30, 2022
- Tentacles of ‘0ktapus’ Threat Group Victimize 130 Firms August 29, 2022
- Ransomware Attacks are on the Rise August 26, 2022
- Cybercriminals Are Selling Access to Chinese Surveillance Cameras August 25, 2022
- Twitter Whistleblower Complaint: The TL;DR Version August 24, 2022
- Firewall Bug Under Active Attack Triggers CISA Warning August 23, 2022
- Fake Reservation Links Prey on Weary Travelers August 22, 2022
- iPhone Users Urged to Update to Patch 2 Zero-Days August 19, 2022
- Google Patches Chrome’s Fifth Zero-Day of the Year August 18, 2022