CIS 552 Week 8 Discussion

docx

School

Strayer University *

*We aren’t endorsed by this school

Course

552

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by PrivateWaterKingfisher31

Report
Week 8 -Discussion Visit the website of the CyberSecurity & Infrastructure Security Agency Links to an external site. . In the search box, type Ransomware and Recent Variants . Click the Alerts tab and choose TA16-091A Ransomware and Recent Variants to read up on this topic. Why are ransomware attacks so effective? Scour the internet for "ransomware variants" and discuss some of the variants found, such as Crytowall. Ransomware attacks are so effective because they elicit fear and panic through intimidation. In these heightened emotional states, people will opt to pay the ransom to regain access to their systems as the easiest option. This can make a system more vulnerable to other malware as well. It is like using one malware to open the door to allow other malware to infect the target system. Also, these ransomware groups are getting better at hiding and distributing their malware and taking advantage of businesses that do not patch vulnerabilities or perform software updates timely. A few variants found include: LockBit is a very prolific ransomware group that is responsible for several high- profile ransomware attacks. It can be purchased as a Ransomware as a Service (RaaS) that requires little to no expertise to use. AvosLocker – Ransomware as a Service (RaaS) affiliated group that has targeted critical infrastructure sectors including financial services, Government facilities, and critical manufacturing sectors. Hive - an affiliate-based ransomware variant used by cybercriminals to attack healthcare facilities, energy providers, retailers, and many other sectors all over the world. It is also a RaaS model that allows affiliates to utilize it however desired. Quantum - a sub-variant of MountLocker ransomware. This is a very destructive strain of malware that rapidly evolves, leaving the victim only hours to pay ransom or incur file encryption. It is often executed in off peak hours, capitalizing on the short timeframe allotted to pay the ransom. Many of these variants have been subject to dismantling by the FBI. Each variant uses a variety of methods or tactics to gain access to the target systems and has attacked several parts of the critical infrastructure. Sources: CISA. June 14, 2023. Understandng Ransomware Threat Actors: LockBit. Understanding Ransomware Threat Actors: LockBit | CISA CISA. November 25, 2022. #StopRansomware: Hive Ransomware. #StopRansomware: Hive Ransomware | CISA
CISA. October 11, 2023. #StopRansomware: AvosLocker Ransomware (Update). #StopRansomware: AvosLocker Ransomware (Update) | CISA Blackberry. N.d. Quantum Ransomware. What Is Quantum Ransomware? (blackberry.com)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help