IT Brief NZ – Ransomware threats evolve to attack backup programs



[ad_1]

Security experts today find signs of growing competition among ransomware distributors

Attackers begin to survey countries until then inaccessible, where users are unprepared to fight ransomware and where competition between criminals is weaker. the online service is becoming more and more popular, amateur cybercriminals trying to make money easily.

Ransomware attacks backup files

The traditional defense against ransomware is to put in place a disaster recovery solution. The most recent machines were saved before the attack.

This pushes modern cybercriminals to attack and remove programs and backup files to remove them as an option for their victims.

One of the few solutions on the market The Acronis Disaster Recovery Cloud system has been taken into account.

The Solution Includes Acronis Active Protection, a Self Defense Mechanism Neil Morarji, Managing Director of Acronis Australia and New Zealand, states: "Ransomware is endangering everyone's data." [19659002] "With Acronis' cyberprotection solutions, including: Acronis Disaster Recovery Cloud, we are making ransomware a less viable tool for cybercriminals. "

Better than signature-based threat detection

Acronis Active Protection is based on a heuristic approach to malware detection, and advanced that the traditional signature-based approach.

While A signature can detect a single sample, the heuristic analysis can detect several or even hundreds of file samples belonging to a so-called family (usually similar in behavior or action patterns) [19659002] Behavioral heuristics are a string of actions (file system events, to be precise) performed by a program that is then compared to a chain of events in a

Acronis Active Protection checks all suspicious processes detected against whitelist and blacklist

Potential ransomware stopped and blacklisted, preventing it he will restart at the next reboot. 19659002] This is important because the user does not need to repeat the ransomware blocking process the next time the machine starts.

Bait Laying

The Acronis Active Protection feature includes honeypots specially designed to find and

As a bee is drawn to honey, ransomware often looks for certain types of files.

If these file types are in controlled directories, you can capture and isolate the ransomware.

Because these directories are controlled by Acronis Active Protection, the infection can not spread.

Users will not see these files because they are hidden in the system and take up very little space. space on a hard drive, so this extra layer of security does not create any inconvenience.

Integration of Machine Learning

Machine Learning brings an unparalleled standard of living to Acronis Active Protection, especially with respect to zero-day threats.

It creates a model of legitimate processes, so even if the bad actors find a new vulnerability or a way to infiltrate the system, it will detect the ransomware processes and stop them.

The Acronis machine learning infrastructure is built as new anonymized user data will be uploaded regularly for analysis.

Machine learning not only increases the level of detection, but also reduces potential false positives as it acts as a second authority for heuristics to make a final decision. The FBI and other organizations agree that ransomware attacks will continue to occur more frequently, especially in businesses and small businesses.

They are equipped to handle such threats because it is only a matter of time before they are attacked.

Acronis Disaster Recovery Cloud enables businesses to recover from attacks with minimal downtime, ensuring business continuity. [ad_2]
Source link