2 min read

Introducing RansomCloud. The Evolution of Ransomware.

Introducing RansomCloud. The Evolution of Ransomware.

RansomCloud attacks your cloud data!

It’s a ransomware attack built for the cloud...

A ransomware attack is when an outside party accesses computer data and encrypts it or holds it hostage, demanding a ransom in order for the business or individual to regain access. Typically, the attacker will do this by sending a legitimate-looking email, also known as a phishing email, but when the unsuspecting person opens the email and clicks on a link, their data becomes encrypted.

RansomCloud is Ransomware that targets your cloud data...

It’s a ransomware attack built for the cloud that can infect and encrypt your hosted email as well as lock you out of OneDrive and SharePoint sites. In these attacks, the hacker uses phishing emails to gain control of the user’s email account. Once inside, the hacker can deploy ransomware that encrypts the victim’s email messages and can also cause additional damage by using the compromised email account to disperse more malware to the victim’s contacts.  

RansomCloud

 

Your business runs on email, so losing access to how you connect with customers, vendors, and the rest of your organization could be crippling.

These attacks can happen to anyone, and they're so sneaky that all it takes is one person clicking a wrong email to lock an entire business's files. As hackers continue to advance their approach, we'll start to see new strains build out this new category of ransomware. 

This threat is demonstrated in the video below by Kevin Mitnick, formerly the most wanted hacker in the US now turned cybersecurity consultant.

 

 

 

Check out these screenshots demonstrating how RansomCloud works.

 

In this sequence of images, Kevin Mitnick shows just how easy it is for your Office 365 emails to be infected by RansomCloud.

1. A phishing email hits your inbox. It looks like a pretty legit email from Microsoft and their AntiSpam Pro service. Let's open it up (click #1)

 

Image of Phishing RansomCloud Exploit Hitting Inbox

Phishing RansomCloud Exploit Hitting Inbox - Image Courtesy Datto

 

2. Briefly scanning the email, looks like there's an update to their AntiSpam service that you can enable by clicking the link. (click #2)

 

Phishing RansomCloud Update Request with Link

Phishing RansomCloud Request with Link - Image Courtesy Datto

 

New call-to-action

 

3. This then prompts you to log into your Microsoft account.

 

RansomCloud Login Hack

Phishing RansomCloud Log In Prompt - Image Courtesy Datto

 

4. You then grant permission to access your email.

 

RansomCloud Email Access

Phishing RansomCloud Granting Access to Email - Image Courtesy Datto

 

5. You're redirected back to your inbox. Everything looks fine, all emails are there...

 

RansomCloud End of Attack

Phishing RansomCloud Inbox Before Encryption - Image Courtesy Datto

 

6. And then you find your entire inbox is encrypted because you fell for the phishing email that handed over access to your Office 365 inbox.

 

Preventing RansomCloud

Phishing RansomCloud Encrypted Inbox - Image Courtesy Datto

 

7. Just like that, you're prompted to pay a ransom to decrypt and recover your emails.

 

RansomCloud Exploit

Phishing RansomCloud Pay to Decrypt - Image Courtesy Datto

 

Not commonly known is that Microsoft and Google don't back-up your files for you, and your traditional back-up works solely on your physical hardware, not what you have located in the cloud. To get complete back-ups of your cloud email and files you need to upgrade services with Microsoft, but industry experts recommend using a third party outside of Microsoft or Googles systems to back-up your data. If you do get RansomCloud and have third party back-ups, you can get back on your feet in no time.

 

Tips to protect yourself and your data from a Ransomware or RansomCloud Attack:

  • Protect local devices with next-generation antivirus solutions that can defend against ransomware.
  • Keep your computer operating systems up to date with security patches.
  • Use web filtering services to prevent connection to infected websites.
  • Disconnect infected devices from the internet immediately and seek technical support from an IT professional.
  • Use a third-party backup and disaster recovery solution.

As the cyber threat landscape continues to change as our technology does, be sure to change with it through cybersecurity services that look out for you.

 

Protect Your Business Against Cyberattack

Teknologize has clients throughout the Pacific Northwest with offices located in the Tri-Cities, Washington 509.396.6640 and Bend, Oregon 541.848.6072.

Don't Get Caught Off Guard: 5 New Cybersecurity Threats to Prepare For Now

Don't Get Caught Off Guard: 5 New Cybersecurity Threats to Prepare For Now

The year 2023 marked a significant turning point for cyber-attacks with the introduction of AI (artificial intelligence), now in the hands of people...

Read More
Teknologize Successfully Completes Another SOC 2 Audit

Teknologize Successfully Completes Another SOC 2 Audit

At Teknologize, we continually invest in security best practices to ensure that our client’s data stays safe and secure. As a part of an ongoing...

Read More
IT Profitability Roadmap and Checklist for Maximizing Efficiency and Cost Savings

IT Profitability Roadmap and Checklist for Maximizing Efficiency and Cost Savings

If you’re hoping to cut costs and boost profitability without compromising productivity or efficiency, assessing the technology you use in day-to-day...

Read More