blog.pradeo.com Open in urlscan Pro
2606:2c40::c73c:67e1  Public Scan

Submitted URL: https://blog.pradeo.com/e3t/Ctc/OM+113/ch5Kr04/VVqqN-74nQ84W7tHlRW2BqB1jW7xsyK954zGyHN54gmP63lYMRW6N1vHY6lZ3kYW8J1Fkz1Yz...
Effective URL: https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33A...
Submission: On October 13 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9

<form id="hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9"
  class="hs-form-private hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_299a6a92-3012-4f43-9d74-d98c7484275a hs-form stacked"
  target="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" data-instance-id="299a6a92-3012-4f43-9d74-d98c7484275a" data-form-id="caf050a8-9ff7-4223-8e7a-0bad8656b2b9" data-portal-id="2378615">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" class="" placeholder="Enter your Email"
      for="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" name="email" required="" placeholder="Enter your email here" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
      id="label-blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" class="" placeholder="Enter your Notification Frequency"
      for="blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764"><span>Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1697187409471&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1663853343732&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;pageUrl&quot;:&quot;https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&amp;_hsmi=278111799&amp;_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&amp;utm_content=278111799&amp;utm_source=hs_email&quot;,&quot;pageId&quot;:&quot;42224642964&quot;,&quot;urlParams&quot;:{&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;278111799&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&quot;,&quot;utm_content&quot;:&quot;278111799&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.pradeo.com/mobile-security-ransomware&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;a074079965002d245153aedd19cee5db&quot;,&quot;__hsfp&quot;:3857904254,&quot;__hssc&quot;:&quot;104134431.1.1697187409964&quot;,&quot;__hstc&quot;:&quot;104134431.a074079965002d245153aedd19cee5db.1697187409963.1697187409963.1697187409963.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_module_159990330965303_blog_subscribe_9764&quot;,&quot;formInstanceId&quot;:&quot;9764&quot;,&quot;pageName&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1697187409981,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2378615&quot;,&quot;formId&quot;:&quot;caf050a8-9ff7-4223-8e7a-0bad8656b2b9&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_module_159990330965303_blog_subscribe_9764&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;9764&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;<span>Thank you for subscribing! We’ll keep you posted.</span>&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;pageId&quot;:&quot;42224642964&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;299a6a92-3012-4f43-9d74-d98c7484275a&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;blog_default_hubspot_blog_subscription&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3938&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3938&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3938&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;42224642964&quot;,&quot;analyticsPageId&quot;:&quot;42224642964&quot;,&quot;pageContextPageId&quot;:&quot;42224642964&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1697187409553,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Smartphones and tablets : An open door to ransomwares\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&amp;_hsmi=278111799&amp;_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&amp;utm_content=278111799&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;278111799\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio\&quot;,\&quot;utm_content\&quot;:\&quot;278111799\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;pageId\&quot;:\&quot;42224642964\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1697187409555,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1697187409976,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;a074079965002d245153aedd19cee5db\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.pradeo.com/mobile-security-ransomware\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;42224642964\&quot;}&quot;}]}"><iframe
    name="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9

<form id="hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9"
  class="hs-form-private hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_e33eefb1-3a84-4a3d-a3df-ffe637c73bc7 hs-form stacked"
  target="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" data-instance-id="e33eefb1-3a84-4a3d-a3df-ffe637c73bc7" data-form-id="caf050a8-9ff7-4223-8e7a-0bad8656b2b9" data-portal-id="2378615">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" class="" placeholder="Enter your Email"
      for="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" name="email" required="" placeholder="Enter your email here" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
      id="label-blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" class="" placeholder="Enter your Notification Frequency"
      for="blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759"><span>Notification Frequency</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1697187409471&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1663853343732&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;pageUrl&quot;:&quot;https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&amp;_hsmi=278111799&amp;_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&amp;utm_content=278111799&amp;utm_source=hs_email&quot;,&quot;pageId&quot;:&quot;42224642964&quot;,&quot;urlParams&quot;:{&quot;utm_medium&quot;:&quot;email&quot;,&quot;_hsmi&quot;:&quot;278111799&quot;,&quot;_hsenc&quot;:&quot;p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&quot;,&quot;utm_content&quot;:&quot;278111799&quot;,&quot;utm_source&quot;:&quot;hs_email&quot;},&quot;isHubSpotCmsGeneratedPage&quot;:true,&quot;canonicalUrl&quot;:&quot;https://blog.pradeo.com/mobile-security-ransomware&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;hutk&quot;:&quot;a074079965002d245153aedd19cee5db&quot;,&quot;__hsfp&quot;:3857904254,&quot;__hssc&quot;:&quot;104134431.1.1697187409964&quot;,&quot;__hstc&quot;:&quot;104134431.a074079965002d245153aedd19cee5db.1697187409963.1697187409963.1697187409963.1&quot;,&quot;formTarget&quot;:&quot;#hs_form_target_module_160104611788712_2759&quot;,&quot;formInstanceId&quot;:&quot;2759&quot;,&quot;pageName&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1697187409985,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;2378615&quot;,&quot;formId&quot;:&quot;caf050a8-9ff7-4223-8e7a-0bad8656b2b9&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hs_form_target_module_160104611788712_2759&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;2759&quot;,&quot;formsBaseUrl&quot;:&quot;/_hcms/forms&quot;,&quot;css&quot;:&quot;&quot;,&quot;inlineMessage&quot;:&quot;<p style=\&quot;text-align: center;\&quot;>Thanks for Subscribing!</p>&quot;,&quot;isMobileResponsive&quot;:true,&quot;pageName&quot;:&quot;Smartphones and tablets : An open door to ransomwares&quot;,&quot;pageId&quot;:&quot;42224642964&quot;,&quot;contentType&quot;:&quot;blog-post&quot;,&quot;formData&quot;:{&quot;cssClass&quot;:&quot;hs-form stacked&quot;},&quot;isCMSModuleEmbed&quot;:true},&quot;correlationId&quot;:&quot;e33eefb1-3a84-4a3d-a3df-ffe637c73bc7&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;,&quot;blog_default_hubspot_blog_subscription&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.3938&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.3938&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;3938&quot;,&quot;_debug_allPageIds&quot;:{&quot;embedContextPageId&quot;:&quot;42224642964&quot;,&quot;analyticsPageId&quot;:&quot;42224642964&quot;,&quot;pageContextPageId&quot;:&quot;42224642964&quot;},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1697187409579,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Smartphones and tablets : An open door to ransomwares\&quot;,\&quot;pageUrl\&quot;:\&quot;https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&amp;_hsmi=278111799&amp;_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&amp;utm_content=278111799&amp;utm_source=hs_email\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36\&quot;,\&quot;urlParams\&quot;:{\&quot;utm_medium\&quot;:\&quot;email\&quot;,\&quot;_hsmi\&quot;:\&quot;278111799\&quot;,\&quot;_hsenc\&quot;:\&quot;p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio\&quot;,\&quot;utm_content\&quot;:\&quot;278111799\&quot;,\&quot;utm_source\&quot;:\&quot;hs_email\&quot;},\&quot;pageId\&quot;:\&quot;42224642964\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:true}&quot;},{&quot;clientTimestamp&quot;:1697187409579,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;},{&quot;clientTimestamp&quot;:1697187409982,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;a074079965002d245153aedd19cee5db\&quot;,\&quot;canonicalUrl\&quot;:\&quot;https://blog.pradeo.com/mobile-security-ransomware\&quot;,\&quot;contentType\&quot;:\&quot;blog-post\&quot;,\&quot;pageId\&quot;:\&quot;42224642964\&quot;}&quot;}]}"><iframe
    name="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" style="display: none;"></iframe>
</form>

Text Content

This website stores cookies on your computer. These cookies are used to collect
information about how you interact with our website and allow us to remember
you. We use this information in order to improve and customize your browsing
experience and for analytics and metrics about our visitors both on this website
and other media. To find out more about the cookies we use, see our Privacy
Policy.

If you decline, your information won’t be tracked when you visit this website. A
single cookie will be used in your browser to remember your preference not to be
tracked.

Accept Decline
 * Expertise
   * Pradeo Security Technology
   * Application Expertise
   * Data Protection Laws
 * Solutions
   PRODUCTS Mobile Threat Defense Mobile App Security Testing In-App Protection
   Secure Private Store Mobile Threat Intelligence
   BUSINESS NEEDS UEM / MDM Security BYOD security Enrich SIEM
   USE CASES Government Banking & Insurance Pharmaceutical Logistic Energy
 * Resources
   * Solution datasheets
   * Customer Case Studies
   * Integration datasheets
   * White Papers, Reports & Studies
   * Webinars
   * Marketplace
 * Company
   * About us
   * Our team
   * Awards
   * Jobs
 * Blog
 * Contact
   
 * en
   * FR
   * DE
   


TOPICS

 * Select a Topic
    * All
    * Mobile Security
    * Mobile Application Security
    * Cybersecurity
    * Expertise
    * Security Alert
    * Partners
    * Corporate
    * Events
    * News
    * cyberattack
    * predictions




STAY UP TO DATE

SUBSCRIBE TO OUR BLOG


STAY UP TO DATE

Email*

Notification Frequency


cyberattack


SMARTPHONES AND TABLETS : AN OPEN DOOR TO RANSOMWARES


By Romain Chassere on May, 10 2023



The FBI's Internet Crime Complaint Center reported recently a 62% year-over-year
increase of ransomware attacks. At a time when we hear more often than ever
about this threat in the global media, it should be noted that ransomwares are
not new, but currently gaining a lot of popularity among cybercriminals.



Today, a wide variety of public and private organizations are attacked. However,
for cybercriminals the most suitable targets are those with poor IT hygiene, in
fruitful sectors or whose activity continuance is critical. Quite often, public
organizations' cyberdefense budgets are not adapted to the criticality of the
information they handle. Thus, they are particularly affected by threats such as
ransomwares.

When the criticality of some devices is underestimated, as it is often the case
with smartphones and tablets, hackers' access is facilitated.

 


EVOLUTION OF RANSOMWARES

In the recent months, two new trends have emerged. On the one hand, it has been
observed that ransomwares are often used as part of large-scale attacks,
sometimes prepared months in advance and targeting carefully selected companies
or public institutions (critical sector, high added value...). Qualified as Big
Game Hunting, these onslaughts are often carried out by teams of hackers who
have more financial and/or human resources than the average.

The second trend is the opposite of the first. It is the widespread of
Ransomware-as-a-Service offers on the dark web, aimed at people with little IT
knowledge and looking for a simple and fast way to launch attacks. The Jigsaw
ransomware, for example, is sold for about 3,000 dollars on cybercriminal
forums. RaaS is available on a subscription basis and sometimes offers a
management platform like any SaaS solution to monitor attacks. Much less
powerful than Big Game Hunting, RaaS usually targets individuals or small
businesses, randomly.

 


HOW CAN A RANSOMWARE INFILTRATE YOUR SYSTEM?


INFECTION METHODOLOGY

To deploy a ransomware on an organization's information system, cybercriminals
use fleets of computers, smartphones or tablets. Often, they use phishing and
software vulnerabilities.

 

Phishing email

Operable on a large scale for free, email is a favoured way to spread
ransomwares. A recent study conducted by Pradeo in Q4 2020 shows that 34% of
employees click on the link presented in phishing attempts sent by text message
(email, SMS or via messaging applications).

 



Source : ANSSI - State of ransomware
 

Malicious or hijacked web page

Some websites mimic known company pages or display a false window to entice
Internet users to download a program, for example, claiming a security flaw in
the OS or a required update. The program is actually a malware.

 



Source : ANSSI - State of ransomware threat

 

Vulnerabilities exploitation

 * Server: Some network vulnerabilities can be exploited to spread malware. In
   2020, a vulnerability in Citrix products allowed malicious individuals to
   execute code remotely.
 * Software: Security holes in softwares can facilitate access to corporate
   data. For example, the democratization of VPN services makes them a target of
   choice and some are victims of brute force attacks to obtain administrators'
   credentials.


ENCRYPTION AND RANSOM DEMAND

When installed on a device connected to an information system, ransomwares
quarantine security and remote management programs, and then encrypt local and
remote files, connected disks, etc. Once this step is completed, a ransom is
asked.

In most cases, hackers demand to be contacted within a given time frame. Beyond
that deadline, the encrypted information is erased, sold or published online.

However, even if the payment is made (often in cryptocurrency, therefore
untraceable), the organization is not sure to recover all of its data. To have
an order of magnitude, the amount of a ransom ranges from a few thousand euros
for an individual, and varies between 200,000 and 10 million dollars for the
DarkSide and WastedLocker ransomwares.

 


HEAVY CONSEQUENCES


FINANCIAL LOSSES

Ransomwares are intended to extort money. When they are trapped, organizations
face a dilemma: should we pay the ransom? Whatever their answer is, they will
have to face financial losses related to an untimely shutdown of their activity,
a complete clean-up of their information system, investigations to establish the
source of the attack, penalties from data protection authorities, etc...


DATA LEAKS

During a ransomware attack and regardless of the reaction of the victim, data
leakage is inevitable. Even when the ransom is paid and the data is restored,
the stolen information usually ends up on the black market.


FORCED SHUTDOWN

A cyberattack often renders the computer system inoperable. It can slow down or
even paralyze the activity of the affected organization. In some sectors, this
leads to considerable financial losses, in others, such as in the healthcare
sector and particularly in hospitals, it directly jeopardizes patients' safety.


IMAGE DAMAGES

When an organization falls victim to ransomware, or any other attack leading to
data leakage, it is difficult to keep it quiet. Sometimes, the legislation
requires (in most countries) to notify such incidents to the government agency
in charge of data protection. The media coverage of a security breach has
serious consequences on a brand image, which can cause a loss of confidence from
stakeholders: customers, partners, investors, etc.

 

--------------------------------------------------------------------------------

 

Prevent ransomware from exploiting your mobile fleet to infect your information
system, protect your mobile devices with Pradeo Security.

ABOUT THE AUTHOR

More from this author

ROMAIN CHASSERE





RECOMMENDED ARTICLES


POPULAR ARTICLES

 * SMS OTP Authentication: Not As Safe As You May Think
 * Two spyware tied with China found hiding on the Google Play Store
 * New malware detected on Google Play, 100.000+ users affected
 * Malicious app on Google Play drops banking malware on users’ devices
 * Spyware dubbed Facestealer infects 100,000+ Google Play users


STAY UP TO DATE

Email*

Notification Frequency




RECENT ARTICLES

 * SpyNote malware now targeting banking applications
 * Pradeo recognized in 2023 Gartner Peer Insights™ Voice of the Customer for
   Mobile Threat Defense
 * Two spyware tied with China found hiding on the Google Play Store
 * Pradeo launches unmatched benefits for MSSPs with its latest Mobile Threat
   Defense release
 * Smartphones and tablets : An open door to ransomwares


ARTICLES RÉCENTS

SpyNote malware now targeting banking applications
- 10 May, 2023
Pradeo recognized in 2023 Gartner Peer Insights™ Voice of the Customer for
Mobile Threat Defense
- 10 May, 2023
Two spyware tied with China found hiding on the Google Play Store
- 10 May, 2023
Pradeo launches unmatched benefits for MSSPs with its latest Mobile Threat
Defense release
- 10 May, 2023
Smartphones and tablets : An open door to ransomwares
- 10 May, 2023


TOPICS

 * Mobile Security (52)
 * Mobile Application Security (38)
 * Cybersecurity (26)
 * Expertise (26)
 * Security Alert (21)
 * Partners (19)
 * Corporate (12)
 * Events (4)
 * News (4)
 * cyberattack (1)
 * predictions (1)

see all



GET IN TOUCH WITH MOBILE SECURITY EXPERTS

Contact us

European leader in mobile security, Pradeo protects business mobile devices and
applications.

Read More

 * Resources
 * UEM security
 * Use cases
 * Data protection
 * Contact us

 * Mobile Threat Defense
 * Mobile Application Security Testing
 * In-App Protection
 * Secure Private Store
 * Mobile Threat Intelligence

contact@pradeo.com

Copyright @ 2022. All Right Reserved.
 * 
 * 
 *