The five most common ways businesses get compromised by ransomware | SC Media

The five most common ways businesses get compromised by ransomware | SC Media

Most organizations know they need to defend their information technology and business assets from ransomware. It’s figuring out the how and where that so often trips them up.


To that end, a new blog from threat intelligence company Red Canary lays out five of the most common infection vectors they see when responding to ransomware incidents.


Email attachments remains the largest attack surface where many organizations are compromised. Often, attackers use Javascript or ZIP files that when opened are capable of doing a lot of damage, very quickly.


“Many of the IR engagements I have seen started with a simple attachment that successfully executed a piece of code and spread ransomware throughout an entire organization in a matter of minutes,” wrote Eric Groce, an incident responder at Red Canary who authored the blog.


In an interview with SC Media, Groce said that email protection platforms provided by a growing number of antivirus and cybersecurity companies actually do a great job of defanging malware found in email attachments or links, but they remain a successful entry point because many c ..

Support the originator by clicking the read the rest link below.