Effective Ransomware Responses: Understanding Ransomware and How to Successfully Combat It

At FireEye, we’ve been observing an increased use of ransomware for a while now. Some factors contributing to the rise include high profit margins coupled with low overhead, the financial success of ransomware families such as CryptoWall, the emergence of ransomware variants adopting a ransomware-as-a-service framework, and the major media coverage of high-profile ransomware attacks.

Just this year we’ve seen WannaCry ransomware spread fast and infect countless machines using the now infamous EternalBlue exploit that was revealed in the Shadow Brokers leak. Then, about a month later, EternalPetya ransomware did the same thing. When considering how financially successful and widely reported these attacks were – as well as 2016 attacks against hospitals and other major entities – then it’s not hard to see why threat actors continue to rely on this tricky type of malware.

To learn more about ransomware and how to protect the email vector against it, download our white paper, Effective Ransomware Responses: Understanding Ransomware and How to Successfully Combat It. This white paper contains a variety of information that will help organizations stay ahead of the threat posed by ransomware, including:

  • An overview of what ransomware is, how it works, and the different types of damage it causes.
  • A glimpse at five ransomware examples that FireEye tracks, such as Cerber and Locky.
  • Effective email-borne ransomware response strategies.

To reduce the chances of being infected with ransomware, organizations need system-wide visibility and a strong understanding of tactics, techniques and procedures being used by today’s attackers. Download the white paper, Effective Ransomware Responses: Understanding Ransomware and How to Successfully Combat It, to ensure your organization is prepared.