Python Ransomware – Expert Comments

By   ISBuzz Team
Writer , Information Security Buzz | Oct 11, 2021 07:29 am PST

BACKGROUND:

Earlier this week, threat researchers at Sophos discovered a new strain of ransomware, written in Python and designed to deploy ransomware unusually fast. The strain was used to compromise and encrypt virtual machines hosted on an ESXi hypervisor.

Subscribe
Notify of
guest
1 Expert Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
Mieng Lim
Mieng Lim , VP of Product Management
October 11, 2021 3:30 pm

<p><span lang=\"EN-GB\">Ransomware threats are constantly evolving. From the commoditization of ransomware through the recent availability of as-a-service tools, to increasingly sophisticated attack strategies, it is a threat landscape that demands constant monitoring and education from organizations and governments alike. This is perfectly illustrated by the new strain of ransomware discovered by Sophos this week.</span></p>
<p><span lang=\"EN-GB\">Typically, hackers enter their victim’s systems and linger undetected, harvesting data and identifying targets before they deploy a targeted ransomware attack. However, this new python-based ransomware enters systems and initiates an attack within a few hours, making fast-acting threat detection and response absolutely essential for businesses. </span></p>
<p><span lang=\"EN-GB\">The first step in building an effective ransomware mitigation strategy is always setting realistic expectations. Ransomware breaches are no longer fully preventable, so businesses must focus on layering defensive barriers between an attacker and their most sensitive data. Running regular penetration testing and vulnerability scanning can help an organization identify and repair possible attack vectors, closing backdoors before an attacker can enter them and minimizing an attacker’s ability to escalate their privileges once inside the system. </span></p>
<p><span lang=\"EN-GB\">However, for any organization looking to improve its cyber threat response time, threat detection tools are a must. Network Traffic Analysis (NTA) works to monitor a network for any suspicious activity, detecting ransomware breaches and infection as quickly as possible. On top of these, active threat scans can give the organization peace of mind. If a breach is spotted, it is important to reassess the state of the IT environment to ensure that there isn’t a repeat attack. Unfortunately, we live in an era where preventing 100% of cyber risks is no longer possible, but constant vigilance, ongoing-cyber threat education, and a well-planned threat detection and response strategy will go a long way towards keeping your organization’s most sensitive data safe.</span></p>

Last edited 2 years ago by Mieng Lim

Recent Posts

1
0
Would love your thoughts, please comment.x
()
x