Ransomware Found In 93% Of Phishing Emails

This is not new to the internet, ransomeware is becoming an increasingly common problem and although we’ve talked about the evolution of this type of malware in the past, a report carried out by the┬áspecialized company PhishMe again gets listening this kind of attack.

ransomeware 2
Yes, because according to the document and from the end of March, 93% of all phishing emails containing encrypted ransomware. However, it is not the worst of the figures, but the analysis indicates that these early compared to the last quarter of 2015 increased by up to 589% to 6.3 million.

The Growth of ransomware :

In this way, it seems that now is when the number of people affected by this kind of attack is greater than ever. A malware grew by 56% in December and increased by 10% every two months.

An escalation whose reasons, the bank must be attributed to the fact that the ransomware is increasingly easier to send, and not only that, but it offers an “easy return on investment” compared to other types of attacks that require more work to obtain economic benefits.

“If you look at the price of redemption, this rarely exceeds 2 bitcoin, a relatively low amount for a small or medium enterprise,” said Brendan Griffin, PhishMe. “A figure that is easier to pay rather than continue the fight against fraud.”

ransomeware 3
A situation that could change, especially if we consider other studies that point precisely to the ransomware threatens to become a billionaire problem. Not to mention cases such as the Hollywood Presbyterian Medical Center, who was asked a ransom of more than 15,000 euros to the middle of this February.

Moreover, PhishMe also recorded their presence in different months, noting that represented 51% in March, compared with 29% and 15% in February and January, respectively. In any case, the company recommends taking special precautions and “educate” the employees to have the ability to identify this kind of post.

Also checkout : ProxyBack : Malware That Turns Infected Computers into Internet Proxies

Comments

comments

LEAVE A REPLY

Please enter your comment!
Please enter your name here