BreachExchange mailing list archives
Don't Let Your Website Be Held Hostage: Five Ransomware Safety Tips for Online Retailers
From: Inga Goddijn <inga () riskbasedsecurity com>
Date: Wed, 18 Nov 2015 18:01:45 -0600
http://www.tmcnet.com/usubmit/2015/11/18/8279806.htm Cybercriminals have developed a destructive new form of ransomware <http://cts.businesswire.com/ct/CT?id=smartlink&url=http%3A%2F%2Fkrebsonsecurity.com%2F2015%2F11%2Fransomware-now-gunning-for-your-web-sites%2F&esheet=51226757&newsitemid=20151118005153&lan=en-US&anchor=new+form+of+ransomware&index=1&md5=bd3a7d1d7f1f37b7fd998f242989e077> that targets online retailers. Cybercriminals scan websites for common vulnerabilities and use them to install malware that encrypts key files, images, pages and libraries, as well as their backups. The criminals behind these attacks then hold them hostage, and website operators must pay a ransom in anonymous cryptocurrency to unlock the files. "Ransomware has proven to be very lucrative for cybercriminals, so it makes sense that these kinds of attacks are being aimed at online retailers," said Craig Young, security researcher for Tripwire (News <http://www.tmcnet.com/tmcnet/snapshots/snapshots.aspx?Company=Tripwire> - Alert <http://www.tmcnet.com/enews/subs.aspx?k1=%22Tripwire%22>). "Many online businesses depend on holiday shopping revenue, and if they don't have good security and backup plans and are victimized by ransomware, the impact can be devastating." Young identified the following five crucial steps online retailers can take to protect themselves from ransomware: 1. Keep plug-in software, especially shopping carts and blogging components, up-to-date at all times. As soon as a patch for a software vulnerability becomes available, cybercriminals have the information they need to start exploiting any systems that have not yet been updated. 2. Make sure Web ervers are not the sole repository for the website's source code, data and security certificates. Keeping this content in a source code revision tracking system ensures that a Web server does not become a single point of failure. In the event of a ransomware attack, the owner does not risk losing the intellectual property contained in the website source code. 3. Regularly replicate data files and databases so that the system can be easily restored on a fresh server in the event of a cyberattack. 4. Minimize the software applications and services on production Web servers; it should not be used as a workstation. Ideally, nothing should be stored in home directories except for basic configuration files. This limits the potential risk for data loss. 5. Various online services like Amazon Glacier and Iron Mountain (News <http://www.tmcnet.com/tmcnet/snapshots/snapshots.aspx?Company=Iron+Mountain> - Alert <http://www.tmcnet.com/enews/subs.aspx?k1=%22Iron+Mountain%22>) provide the ability to back up important data and can be used to recover it in the event of catastrophic loss. Alternately, the use of virtualized servers updated with snapshots of key data that occurs at regular intervals minimizes the risk posed by cybercriminals. "In some cases, ransomware victims do not gain access to their files even after paying the ransom," said Young. "It's much more effective to protect your business against infections than to take action after you've been attacked."
_______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://lists.osvdb.org/mailman/listinfo/dataloss For inquiries regarding use or licensing of data, e-mail sales () riskbasedsecurity com Supporters: Risk Based Security (http://www.riskbasedsecurity.com/) YourCISO is an affordable SaaS solution that provides a comprehensive information security program that ensures focus on the right security. If you need security help or want to provide real risk reduction for your clients contact us!
Current thread:
- Don't Let Your Website Be Held Hostage: Five Ransomware Safety Tips for Online Retailers Inga Goddijn (Nov 19)