b'BUSINESS SECURITY CSIA 11CYBER SECURITY: HUMAN OPERATED RANSOMWARE ON THE RISEBy: Jack Gerbs Quanexushave exploited the private infrastructure do they then execute a typical ransom-ware attack by encrypting data and asking for money. These criminals can live in a company network for months, T he cost of ransomware attacks in 2021 areTheseusing the business infrastructure for their gains.projected to reach $20 Billion, almost double the cost impact from 2019. A ransomwarehands on keyboard attacks are more time attack occurs after a criminal has gainedconsuming for the criminal, but they can also be much access to a system through a phishing attack or stolenmore profit-able, which is why we are seeing the in-credentials. A typical ransomware attack encrypts data,crease. While malware attacks are on the decline, which stops the company from doing business untilransomware attacks increased 40% last year. Criminals the ransom is paid. In a human operated ransomwareare focusing time and effort on these more elaborate attack, the criminals gain access to a business networkattacks that yield greater gains.and move around the network to see what they can find.Preventing these targeted attacks starts with education Microsoft does a good job explaining the differenceas always. The criminal has to get into the network between the two attack methods: first. Continued education on phishing campaigns and password management is critical. Additionally, a Human-operated ransomware attacks are a cut abovelayered security approach is the best defense along run-of-the-mill commodity ransomware campaign.with network monitoring tools. These tools can alarm Adversaries behind these attacks exhibit extensiveIT departments to unusual network activity like using knowledge of systems administration and commonworkstations to mine bitcoin. road.network security misconfigurations, which are often lower on the list of fix now priorities. Five Cybersecurity Statistics77% of organizations saw more or the same number Once attackers have infiltrated a network, they performof cyberattacks over the past year.thorough reconnaissance and adapt privilege escalation15% of organizations closed their business because and lateral movement activities based on securityof a cyberattack.weaknesses and vulnerable services they discover62% of organizations anticipate an attack in the in the network. next 12 months.70%oforganizationsplantoincreasetheir Hackers can use the business infrastructure to minecybersecurity budget bitcoin,runSPAMcampaigns,orusecompany58% of organizations believe they will face an workstations for other criminal activities. Only after theyinsider security threat over the next year.csiaonline.org'