You Are Viewing

A Blog Post

Scammers continue to defraud and extort funds from businesses using Cryptowall ransomware

Data from the FBI’s Internet Crime Complaint Center (IC3) shows ransomware continues to spread and is infecting devices around the globe. Recent IC3 reporting identifies CryptoWall as the most current and significant ransomware threat targeting U.S. individuals and businesses.

CryptoWall and its variants have been used actively to target U.S. victims since April 2014. The financial impact to victims goes beyond the ransom fee itself, which is typically between $200 and $10,000. Many victims incur additional costs associated with network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. Between April 2014 and June 2015, the IC3 received 992 CryptoWall-related complaints, with victims reporting losses totaling over $18 million.

How do you get infected?

The problem begins when the victim clicks on an infected advertisement, email, or attachment, or visits an infected website. Once the victim’s device is infected with the ransomware variant, the victim’s files become encrypted. In most cases, once the victim pays a ransom fee, he or she regains access to the files that were encrypted. Most criminals involved in ransomware schemes demand payment in Bitcoin. Criminals prefer Bitcoin because it’s easy to use, fast, publicly available, decentralized, and provides a sense of heightened security/anonymity.

Although our clients are protected with different levels of security, we ask all users to be skeptical. Don’t click on any emails or attachments you don’t recognize, and avoid suspicious websites altogether.

Our previous articles:

http://www.arxnetworks.com/news/2014/10/crypto-ransomware/

http://www.arxnetworks.com/news/2013/11/cryptolocker-ransomware-infections/

 

Share
Ray Marmash
Ray Marmash

Ray has delivered business-driven technology solutions to growing companies for more than 18 years. As the founding President of ARX Networks, Ray has re-directed the company’s focus toward a re-vamped IT Support and Operations Procedures, as well as setup Quality Assurance Processes to meet the changing requirements within the outsourced IT industry.


Life Sciences

Stethoscope2

We have worked with medical device, biotech, and healthcare companies helping them to manage R&D environments, security compliance (including HIPPA), and onsite labs. 

 

×
Technology

Information-Technology-Graphic

ARX has experience providing customized IT infrastructure and outsourcing solutions to technology related organizations. 

 

×
Legal Industry

 

Law firms have specific challenges that we know how to address.

×
Financial Services

finance-assignment-help

Financial companies need to maintain internal and external security protocols. We provide:

×
Professional Services

 

Our experience in supporting professional services includes: 

×
Non-Profits

 

 

You can’t afford unplanned network crashes – a stable computer network, trusted IT support team, and planned IT budget is critical to your organization. 

×
Help Desk Services

help desk

Remote support for business critical problems  

×
Managed IT Projects

 

IPED_project-management

As your organization evolves to stay relevant in the changing business world, you will need to modify and adopt new IT technologies to support it. When your organization needs IT consulting guidance and experienced engineers for IT project management and implementation, ARX can help.

We Provide:

×
Backup & Risk Mitigation

Backup (2)

×
Hosted Cloud Solutions

 

Hosted cloud solutions1 (2)

×
VoIP Implementation

 

voip (2)

 

×
Procurement Management

 

computer-peripherals

×
Network Monitoring

Network picture

ARX Networks Monitoring detects and avoids performance events before they impact your business. We are constantly scanning, troubleshooting, and preventing incursions. Our tools include: firewall, VPN, and intrusion prevention systems.

ARX works to prevent spam, viruses, phishing, and denial of service (DoS) attacks on your network.  

 

×
On-Site Response

Capture

We can be onsite when you or your equipment need us.

While a technician is on their way we will be working remotely to get you back up and running.

×
Support Flexibility

 

time and calendar

We will provide the support that you need anytime and anywhere.

Remote and onsite hours can be tailored to support your company and employees.

Is it electronic? Ask us to manage it.

×
Strategic Approach

exit_22We bring a complete overview to all of your IT services, and work to provide the most efficient and economical strategy for current operations and future growth. 

×
Scalable Solutions

scalable

We work with you to help minimize upfront costs, hassles, and growing pains.

Infrastructure overload, clutter, and nuisances are minimized when we prepare your services for expansion.

The hardware and software that we install will grow with your company.

×