Proof that ransomware attacks are targeting Small Medium Businesses.
German SMBs are the target of a new ransomware that’s wreaking havoc on company data.
The ransomware is delivered by a phishing campaign purporting to be from a potential job applicant, and the email contains an attachment that poses as a PDF resume from the sender.
When users click on the attachment, it unleashes a ransomware attack that demands payment in Bitcoin to decrypt the files.
Unfortunately, even if businesses pay the ransom, their files are unrecoverable. This particular ransomware, dubbed GermanWiper, erases the encrypted data, making it permanently inaccessible to users. More on this article here.
GermanWiper is a reminder of the precarious nature of ransomware attacks that are increasingly targeting businesses and government organisations to extract large payments.
If companies are unprepared for a ransomware attack, there is no guarantee that they will ever recover their information by paying a ransom, and other restorative processes can be even more costly than the ransomware demands.
United Kingdom – Oyster
Travel smartcard system for UK public transportation
Exploit: Credential stuffing attack
Risk to Small Business: Severe: Hackers accessed more than 1,000 Oyster user accounts by applying login credentials from other platforms to their Oyster login. This technique, known as a credential stuffing attack, uses stolen data from other websites and compounds the damage by applying that data logins across the internet. To prevent further access, the smartcard system was taken offline for two days, creating delays to the public transit system while damaging their reputation as users took to social media to voice their frustrations about the delays.
Risk to Exploited Individuals: Severe: Oyster is notifying customers who had their accounts compromised, and those users should assume that all available information was compromised in the breach. Moreover, because their accounts were accessed using credential stuffing, users should ensure that they use strong, unique passwords across all accounts.
Customers Impacted: 1,200
New Zealand – Air New Zealand
Flag carrier airline of New Zealand
Exploit: Phishing attack
Risk to Small Business: Severe: Two Air New Zealand employees fell for a phishing attack that compromised customer data. The company is enduring significant online criticism for their management of the data breach, meaning that they are now responsible for improving their cybersecurity standards while they also work to restore their customers’ confidence.
Risk to Exploited Individuals: Severe: In total, the breach compromised the personal information for 3.5% of the airline’s customers. The company notified customers their account passwords and payment details were not compromised. However, other sensitive information, including passport numbers, names, addresses, phone numbers, job titles, employer details could be compromised. Therefore, victims should closely monitor their personal accounts for unusual activity, and credit and identity monitoring services can provide long-term oversight of personally identifiable information.
Customers Impacted: 112,000
Being proactive in developing a cybersecurity plan can be the difference in successfully defending a breach or losing millions to a harmful attack.
Protect your data, privacy and reputation, talk to a TCT sales team member today.
Follow us on LinkedIn: