Earlier this month a hacker attack was carried out on the computer servers of Hrvatske vode.
Also, HAK was attacked for several days in June of this year, just when traffic jams started during the summer season. Then the threat actor demanded a certain amount of money, and the long-term recovery of the system suggested that the damage was significant.
Threat actors are getting increasingly bold in their ransomware demands, giving their targets no choice but to relent and pay to get their data back and restore daily operations. Luckily, businesses start to acknowledge ransomware risk. For example, Hornetsecurity revealed that 92.5% businesses are aware of ransomware’s potential for negative impact. Still, just 54% of respondents said their leadership is ‘actively involved in conversations and decision-making’ around preventing such attacks. 39.7% said they were happy to ‘leave it to IT to deal with the issue’.
Reassuringly, 93.2% of respondents rank ransomware protection as ‘very’ to ‘extremely’ important in terms of IT priorities for their organization, and 87.8% of respondents confirmed they have a disaster recovery plan in place for a ransomware attack.
However, that leaves 12.2% of organizations without a disaster recovery plan. Of those companies, more than half cited a ‘lack of resources or time’ as the primary reason. Additionally, one-third of respondents said a disaster recovery plan is ‘not considered a priority by management’.
Another research - 2023 Thales Data Threat Report shows that 49% of IT professionals reported an increase in ransomware attacks with 22% of organizations having experienced a ransomware attack in past 12 months.
Ransomware attacks can bring business operations to a grinding halt by blocking access to critical data until the attack is resolved – a major threat to organizations concerning cost and reputation. In addition to existing perimeter controls, a data-centric approach is needed to safeguard critical data from being encrypted by unauthorized processes.
Ransomware Protection -> Thales CTM
Thales launched CipherTrust Transparent Encryption Ransomware Protection (CTE-RWP), an optional licensed feature to the CipherTrust Data Security Platform. CTE-RWP will elevate the protection of customer files and folders from ransomware attacks via access management controls and encryption processes.
With CTE-RWP, the CipherTrust Data Security Platform brings a new level of protection to the fight against ransomware. CTE-RWP helps protect against ransomware attacks by monitoring the file system and detecting, flagging, or blocking unwanted encryption and data exfiltration.
Specifically, CTE-RWP enables setting trusted lists for critical applications and designating guard points to flag or block processes attempting data exfiltration or encryption. CTE-RWP offers real-time behavioral analysis for user system applications and processes, so customers may use and engage with their files and folders securely and seamlessly.