You are on page 1of 2

The Ultimate Guide to C7010-013 IBM

Cúram V6.0.5 Business Analysis and Design


– pw9.org

C7010-013 IBM Cúram V6.0.5 Business Analysis and Design Certification Exam
Credential. The level of potential damage to a business is heightened as ransomware incidents
become more advanced, such as the increase in fileless attacks which exploit tools and features
that are already available in the victim’s environment. These specific attacks can be used in
collaboration with social engineering targeting, such as phishing emails, without having to rely
on file-based payloads. And unfortunately, ransomware is extremely difficult to avoid – it’s as
simple as one click on the wrong link or opening malicious attachments.

Organisations of any size can suffer financially from the effects of ransomware, as well as
inflicting longer-term damage to business reputation. The Irish Department of Health and Health
Service Executive (HSE) was reportedly asked for $20 million (£14 million) to restore access by
The Conti ransomware group. The attacks caused an already strained service from Covid-19
even further cancellations to outpatient services. Some ransomware gangs operate by a flimsy
code of “ethics”, stating they don’t intend to endanger lives, but even if a minority of
ransomware organisations are developing a sense of conscience, businesses are not exempt from
the damage that can be done from such attacks.

Unfortunately when under attack, a majority of businesses often pay the ransom. In the US,
Colonial Pipeline paid the cyber-criminal group DarkSide nearly $5m (£3.6m) in ransom,
following a cyber-attack which caused supplies to tighten across the US as they took its service
down for 5 days Luckily for Colonial Pipeline, some of the money was later recovered by the
American Department Of Justice’s Ransomware and Digital Extortion Task Force. However, a
successful ransomware attack can be used various times against many organisations, and if they
pay once it is likely they will pay again, turning an attack into a cash cow for criminal
organisations offering Ransomware as a Service. There is now an ongoing debate as to if
businesses or individuals paying ransoms should be illegal. At the very least, they should report
it to the necessary regulations.

Trap and Expose


Often, many ransomware attacks go unreported – and this is where a lot of criminal power lies. If
a ransomware attack were to occur, it is crucial that the organisation works with local authorities
to try to rectify the issue and follow the guidance.

Prevention is always better than cure, and damage limitation and containment are important right
from the outset. As the United States’ President, Joe Biden, highlighted in his recent letter to
business leaders around ransomware: “The most important takeaway from the recent spate of
ransomware attacks on U.S., Irish, German and other organizations around the world is that
companies that view ransomware as a threat to their core business operations, rather than a
simple risk of data theft will react and recover more effectively.”

You might also like