Ransomware has been getting a lot of headlines most recently, but a new version of ransomware has arrived and it is even more dangerous than its predecessors. It’s called Ransom-Cloud and it has the power to encrypt cloud-based emails and files.
In the below video, white-hat hacker Kevin Mitnick demonstrates how a Ransom-Cloud attack works.
For those that don’t know, Ransomware is malicious software developed by cyber criminals that has the power to encrypt your data. The only way to decrypt it again, is to pay the criminals’ ransom. Up to this point, ransomware has been targeted towards encrypting the data on a users computer, or their entire network depending on the attack.
In these attacks, many users consoled themselves with the fact that they may have had their emails or files stored in the cloud as well, with the likes of Office 365 or GSuite. Ransom-Cloud however targets your data in the cloud, encrypting your Office 365 or GSuite emails and files.
As usual, the attacker starts with a phishing email, most commonly branded to appear as if it has been sent officially from Microsoft. The email tells you that “Microsoft” have released a new piece of anti-spam software that improves your cloud security.
Once the user clicks on the link to the new software, they are prompted to grant permissions to the new application so it can have access and monitor their emails – in the same way as many email and cloud extensions do.
Once they click “Accept”, the software can access the users cloud-based emails and files and encrypt them at will. Or, they could decide to take over your email account and target any one of your contacts, masquerading as you!
There are two ways to protect yourself and your business from Ransom-Cloud attacks: