{"id":47619,"date":"2022-09-23T10:20:41","date_gmt":"2022-09-23T08:20:41","guid":{"rendered":"https:\/\/cyberant.com\/ransomware-alleen-anti-virus-is-onvoldoende\/"},"modified":"2023-10-31T20:15:46","modified_gmt":"2023-10-31T19:15:46","slug":"ransomware-anti-virus-alone-is-not-enough","status":"publish","type":"post","link":"https:\/\/cyberant.com\/en\/ransomware-anti-virus-alone-is-not-enough\/","title":{"rendered":"Ransomware: Anti-virus alone is not enough"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8e7k8ju-8c2c11deb0e4ca7b09c52a9470fd25a2\">\n#top .av_textblock_section.av-l8e7k8ju-8c2c11deb0e4ca7b09c52a9470fd25a2 .avia_textblock{\nfont-size:40px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8e7k8ju-8c2c11deb0e4ca7b09c52a9470fd25a2 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h1 class=\"h2 entry-title\">Ransomware: Anti-virus alone is not enough<\/h1>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-vexvix-ff2043d5992e3a09fe0fe4af492026f7\">\n#top .hr.hr-invisible.av-vexvix-ff2043d5992e3a09fe0fe4af492026f7{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-vexvix-ff2043d5992e3a09fe0fe4af492026f7 hr-invisible  avia-builder-el-1  el_after_av_textblock  el_before_av_textblock '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l8e7lu1v-03a823fc0e8eb9ff1ad1379b92dbac88\">\n#top .av_textblock_section.av-l8e7lu1v-03a823fc0e8eb9ff1ad1379b92dbac88 .avia_textblock{\nfont-size:16px;\n}\n<\/style>\n<section  class='av_textblock_section av-l8e7lu1v-03a823fc0e8eb9ff1ad1379b92dbac88 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><header class=\"entry-header\">\n<h1 class=\"h2 entry-title\"><\/h1>\n<\/header>\n<div class=\"entry-content\">\n<p><img decoding=\"async\" class=\"attachment-large size-large wp-post-image webpexpress-processed\" src=\"https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-1024x538.jpg\" sizes=\"(max-width: 640px) 100vw, 640px\" srcset=\"https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-1024x538.jpg 1024w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-300x158.jpg 300w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-768x403.jpg 768w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-1536x806.jpg 1536w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920-413x217.jpg 413w, https:\/\/cyberant.com\/wp-content\/uploads\/2020\/08\/ransomware-3998798_1920.jpg 1920w\" alt=\"\" width=\"640\" height=\"336\" \/><\/p>\n<p id=\"tw-target-text\" class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Despite the fact that almost every organization uses an antivirus product, there are many companies that fall victim to ransomware or cryptolockers.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><strong><span lang=\"en\">The anatomy of an attack<\/span><\/strong><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">If we look at today\u2019s threats, we see that relying on antivirus and backups alone is no longer enough. Techniques to trick the virus scanner are becoming more sophisticated, making it difficult to stop ransomware. To understand how cryptolockers work (cryptolockers and ransomware are the same) it is important to know which components a cryptolocker consists of: a vulnerability, an exploit and a payload.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><strong><span lang=\"en\">The vulnerability<\/span><\/strong><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Ransomware always uses a vulnerability to get in. There are two flavors in this: either an employee who clicks on an incorrect link, or a vulnerability in a computer system. The latter category is the most dangerous: without your having to do anything, criminals can take your entire company hostage.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><em><span lang=\"en\">Did you know that the biggest ransomware attacks in history exploited vulnerabilities in computer systems for which a solution had long been available?<\/span><\/em><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><strong><span lang=\"en\">The exploit<\/span><\/strong><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">An exploit is part of the software that a hacker places to actually exploit a leak. It is a small piece of computer code that can take over the computer and sometimes even entire companies.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><strong><span lang=\"en\">The payload<\/span><\/strong><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Once cyber criminals take control of the computer, it is time to tell the computer what to do. In the case of ransomware, all files are encrypted and spread. Sometimes this is also delayed, so that the malicious code can also nestle in the backups. But since the hacker has access, he can also use this access for corporate espionage, for example.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><strong><span lang=\"en\">How can you prevent ransomware?<\/span><\/strong><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Now that we know how an attack works, we can use this knowledge to prevent an attack. We can do this by removing the vulnerability. This is often as simple as installing Windows Updates!<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Vulnerabilities can also be introduced by problems other than outdated software, such as software misconfiguration. By implementing vulnerability management software such as\u00a0<a href=\"https:\/\/cyberantcom.wpengine.com\/en\/partners\/#products\">NetCaptain<\/a>\u00a0for your ICT infrastructure, you ensure that you do not fall victim to ransomware.<\/span><\/p>\n<p class=\"tw-data-text tw-text-large XcVN5d tw-ta\" dir=\"ltr\" data-placeholder=\"Vertaling\"><span lang=\"en\">Do you want to know if you are safe from ransomware? Then contact us.<\/span><\/p>\n<\/div>\n<\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":47620,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[206,216,181],"tags":[207,182,183,197,186,187,208,209],"class_list":["post-47619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","category-knowledge-base","category-risk-management","tag-anti-virus-en","tag-cyber-security-en","tag-cyberaanval-en","tag-cybercriminelen-en","tag-it-infrastructuur-beschermen-en","tag-netcaptain-en","tag-ransomeware-aanval-en","tag-ransomware-en"],"_links":{"self":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/comments?post=47619"}],"version-history":[{"count":0,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/posts\/47619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media\/47620"}],"wp:attachment":[{"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/media?parent=47619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/categories?post=47619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberant.com\/en\/wp-json\/wp\/v2\/tags?post=47619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}