Doxware - The Latest Ransomware
There are some similarities in Doxware and Ransomware. Both encrypt the victims’ files; demand for ransom and are highly automated in nature. In a doxware attack, the compromised files are uploaded to the attacker's system. It is more focused on choosing the files as per confidentiality or privacy. However, in case of ransomware attack, the files are not removed; they are encrypted.
Doxware has its shortcomings too as below:
• Doxware attacks normally happen with small amount of data. The cyber criminals do not have enough space to save thousands of files, and as a result, uploading huge volume of files increases detection risk.
• Criminals always search for maximum profit on their investment and doxware attacks are too costly to implement. In order to ensure profitability, the criminals do extensive research on the potential victims to decide whether the compromised data would be valuable. They chalk out plans on how to publish the data if the victim denies to pay the ransom.
• The criminals need proper framework to host the compromised data and release them online. It can be easily traceable if it is improper.
IT security professionals estimate that doxware attacks might increase over the next couple of years. Till now the victims have been more from businesses and high-profile individuals comparing to general public. Nevertheless, it might change if the criminals start targeting smartphones or IoT devices. If there is access to more devices, the criminals could improve doxware attacks that are cost-effective and target victims on a larger scale.
Prevent Doxware attacks
Any business which is suffering a doxware attack might think that there is no other way but to pay the ransom. However, the payment never ensures the end of worries. If the criminals find out any particular information that is critical, then further demands might come again. In addition, there is no assurance that the criminals will not release the data even after meeting the demands and the victims cannot confirm whether the stolen files have been removed. Thus, the best way to deal with it is to prevent it.
The below steps can keep Doxware attacks at bay:
• Any Doxware attack starts with a phishing attack. The users should know how to recognize and mitigate phishing attempts in the form of attachments or mysterious links coming from unknown senders in the emails. (please refer to the previous blog posted on detection of phishing e-mails)
• Refrain from keeping all sensitive data in a single hard drive; if that is not possible; at least spread the data in multiple devices/ hard drives.
• Always make sure that the important and sensitive files are encrypted.
• Always keep the anti-virus or anti-malware software (like eScan) updated regularly. It should be capable enough to detect and mitigate newer threats that are emerging every day.
• The users need to be more alert towards malvertising and the websites where malware-infected ads appear. These include social media websites, adult websites and other illegal/ unauthorized online shows.
Doxware attacks are comparatively lesser known than the conventional ransomware attacks. However, eScan, being a security software developer, is of the opinion that, any criminal having opportunity to make money, would definitely take advantage of it. Doxware is nothing but another alarming arrow in the cyber-criminal's quiver.
eScan is an ISO (27001) certified pure play enterprise security solution company with over 2 decades of expertise in developing IT security solutions. eScan today has a presence in 12 countries through its offices and subsidiaries. It also boasts of a robust channel partner network of more than 50, 000 partners spread across 190 countries worldwide. It has trusted by more than 6,500 enterprise and corporate users spread across various industry segments such as, Government, BFSI, Education, Defense, Telecom, IT & ITeS, Infrastructure, Hospitality, and Healthcare worldwide.
It is powered by some of the latest and innovative technologies, such as Proactive Behavioral Analysis Engine (PBAE) Technology, MicroWorld Winsock Layer (MWL) Technology, Domain & IP Reputation Check (DIRC) Technology, Non-Intrusive Learning Pattern (NILP) Technology, and sophisticated Anti-Virus Heuristic Algorithms that not only provide protection from current threats, but also provides proactive protection against the ever evolving cyber threats. eScan provides 24x7 free remote support facility to help its esteemed users to provide real time solutions for security related issues.
For more information, visit www.escanav.com
MicroWorld Technologies Inc
39555 Orchard Hill Place
Novi, MI 48375
This release was published on openPR.
Permanent link to this press release:
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.
You can edit or delete your press release Doxware - The Latest Ransomware here
News-ID: 498453 • Views: 535
More Releases from MicroWorld Software Services Pvt. Ltd
eScan introduces innovative Endpoint Protection Solutions for Enterprises
Enterprises can no longer rely solely on traditional security solutions in today’s evolving cyber threat landscape. To effectively combat the sophisticated, stealthy and targeted attacks, enterprises need to effectively implement a defined security solution capable of proactively protecting the endpoints. CISOs need to take a defined approach that will deploy a robust security solution to secure the endpoints from cyber threats at all times for business continuity. Keeping the above challenges
eScan empowers Enterprises with Mobility Management solutions
The rapid growth of mobile devices in an enterprise network has today increased the security concerns for CISOs/CSOs. With the increased penetration of bring your own device (BYOD) policies and growing threat landscape, eScan has now introduced the state of the art Enterprise Mobility Management (EMM) solutions to keep business critical data safe and protected from emerging cyber threats. Bring your own device or using company owned mobile device has become
eScan Research Team advices how to use your Debit / Credit Card safely.
Very recently it has been revealed that around 3.2 million Debit Cards have been compromised, belonging to Indian users. According to various reports, Debit card users of SBI, HDFC bank, ICICI, YES bank and Axis are the worst hit. There are multiple ways in which Debit Card information can be stolen: 1: Phishing 2: Skimming Devices 3: Compromising the Security of a Payment Processor 3.1 Malware/Virus Attack a) ATM Malware b) POS Malware c) Trojan/Keylogger etc. 3.2
eScan antivirus security software continues winning awards in 2011 for security …
eScan continues winning awards in 2011 Mumbai, May 09, 2011: eScan, one of the leading providers of Information security solutions for desktops and servers continues its winning ways by bagging the Jan 2011 PCSL 5 Star award, Advanced+ Certification from AV Comparatives in the Feb 2011 tests and the April 2011 VB100 award successively. The VB100 and AV-Comparatives awards are awarded to products that show good detection and removal capabilities without any