blog.pradeo.com
Open in
urlscan Pro
2606:2c40::c73c:67e1
Public Scan
Submitted URL: https://blog.pradeo.com/e3t/Ctc/OM+113/ch5Kr04/VVqqN-74nQ84W7tHlRW2BqB1jW7xsyK954zGyHN54gmP63lYMRW6N1vHY6lZ3kYW8J1Fkz1Yz...
Effective URL: https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33A...
Submission: On October 13 via api from US — Scanned from DE
Effective URL: https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33A...
Submission: On October 13 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMPOST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9
<form id="hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9"
class="hs-form-private hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_299a6a92-3012-4f43-9d74-d98c7484275a hs-form stacked"
target="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" data-instance-id="299a6a92-3012-4f43-9d74-d98c7484275a" data-form-id="caf050a8-9ff7-4223-8e7a-0bad8656b2b9" data-portal-id="2378615">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" class="" placeholder="Enter your Email"
for="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764"><span>Email</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" name="email" required="" placeholder="Enter your email here" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
id="label-blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" class="" placeholder="Enter your Notification Frequency"
for="blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764"><span>Notification Frequency</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1697187409471","formDefinitionUpdatedAt":"1663853343732","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36","pageTitle":"Smartphones and tablets : An open door to ransomwares","pageUrl":"https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&utm_content=278111799&utm_source=hs_email","pageId":"42224642964","urlParams":{"utm_medium":"email","_hsmi":"278111799","_hsenc":"p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio","utm_content":"278111799","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://blog.pradeo.com/mobile-security-ransomware","contentType":"blog-post","hutk":"a074079965002d245153aedd19cee5db","__hsfp":3857904254,"__hssc":"104134431.1.1697187409964","__hstc":"104134431.a074079965002d245153aedd19cee5db.1697187409963.1697187409963.1697187409963.1","formTarget":"#hs_form_target_module_159990330965303_blog_subscribe_9764","formInstanceId":"9764","pageName":"Smartphones and tablets : An open door to ransomwares","locale":"en","timestamp":1697187409981,"originalEmbedContext":{"portalId":"2378615","formId":"caf050a8-9ff7-4223-8e7a-0bad8656b2b9","region":"na1","target":"#hs_form_target_module_159990330965303_blog_subscribe_9764","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"9764","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"<span>Thank you for subscribing! We’ll keep you posted.</span>","isMobileResponsive":true,"pageName":"Smartphones and tablets : An open door to ransomwares","pageId":"42224642964","contentType":"blog-post","formData":{"cssClass":"hs-form stacked"},"isCMSModuleEmbed":true},"correlationId":"299a6a92-3012-4f43-9d74-d98c7484275a","renderedFieldsIds":["email","blog_default_hubspot_blog_subscription"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3938","sourceName":"forms-embed","sourceVersion":"1.3938","sourceVersionMajor":"1","sourceVersionMinor":"3938","_debug_allPageIds":{"embedContextPageId":"42224642964","analyticsPageId":"42224642964","pageContextPageId":"42224642964"},"_debug_embedLogLines":[{"clientTimestamp":1697187409553,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Smartphones and tablets : An open door to ransomwares\",\"pageUrl\":\"https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&utm_content=278111799&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"278111799\",\"_hsenc\":\"p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio\",\"utm_content\":\"278111799\",\"utm_source\":\"hs_email\"},\"pageId\":\"42224642964\",\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1697187409555,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1697187409976,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a074079965002d245153aedd19cee5db\",\"canonicalUrl\":\"https://blog.pradeo.com/mobile-security-ransomware\",\"contentType\":\"blog-post\",\"pageId\":\"42224642964\"}"}]}"><iframe
name="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_9764" style="display: none;"></iframe>
</form>
POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9
<form id="hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/2378615/caf050a8-9ff7-4223-8e7a-0bad8656b2b9"
class="hs-form-private hsForm_caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9 hs-form-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_e33eefb1-3a84-4a3d-a3df-ffe637c73bc7 hs-form stacked"
target="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" data-instance-id="e33eefb1-3a84-4a3d-a3df-ffe637c73bc7" data-form-id="caf050a8-9ff7-4223-8e7a-0bad8656b2b9" data-portal-id="2378615">
<div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" class="" placeholder="Enter your Email"
for="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759"><span>Email</span><span class="hs-form-required">*</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input id="email-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" name="email" required="" placeholder="Enter your email here" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
</div>
<div class="hs_blog_default_hubspot_blog_subscription hs-blog_default_hubspot_blog_subscription hs-fieldtype-radio field hs-form-field" style="display: none;"><label
id="label-blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" class="" placeholder="Enter your Notification Frequency"
for="blog_default_hubspot_blog_subscription-caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759"><span>Notification Frequency</span></label>
<legend class="hs-field-desc" style="display: none;"></legend>
<div class="input"><input name="blog_default_hubspot_blog_subscription" class="hs-input" type="hidden" value=""></div>
</div>
<div class="hs_submit hs-submit">
<div class="hs-field-desc" style="display: none;"></div>
<div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe"></div>
</div><input name="hs_context" type="hidden"
value="{"embedAtTimestamp":"1697187409471","formDefinitionUpdatedAt":"1663853343732","renderRawHtml":"true","userAgent":"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36","pageTitle":"Smartphones and tablets : An open door to ransomwares","pageUrl":"https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&utm_content=278111799&utm_source=hs_email","pageId":"42224642964","urlParams":{"utm_medium":"email","_hsmi":"278111799","_hsenc":"p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio","utm_content":"278111799","utm_source":"hs_email"},"isHubSpotCmsGeneratedPage":true,"canonicalUrl":"https://blog.pradeo.com/mobile-security-ransomware","contentType":"blog-post","hutk":"a074079965002d245153aedd19cee5db","__hsfp":3857904254,"__hssc":"104134431.1.1697187409964","__hstc":"104134431.a074079965002d245153aedd19cee5db.1697187409963.1697187409963.1697187409963.1","formTarget":"#hs_form_target_module_160104611788712_2759","formInstanceId":"2759","pageName":"Smartphones and tablets : An open door to ransomwares","locale":"en","timestamp":1697187409985,"originalEmbedContext":{"portalId":"2378615","formId":"caf050a8-9ff7-4223-8e7a-0bad8656b2b9","region":"na1","target":"#hs_form_target_module_160104611788712_2759","isBuilder":false,"isTestPage":false,"isPreview":false,"formInstanceId":"2759","formsBaseUrl":"/_hcms/forms","css":"","inlineMessage":"<p style=\"text-align: center;\">Thanks for Subscribing!</p>","isMobileResponsive":true,"pageName":"Smartphones and tablets : An open door to ransomwares","pageId":"42224642964","contentType":"blog-post","formData":{"cssClass":"hs-form stacked"},"isCMSModuleEmbed":true},"correlationId":"e33eefb1-3a84-4a3d-a3df-ffe637c73bc7","renderedFieldsIds":["email","blog_default_hubspot_blog_subscription"],"captchaStatus":"NOT_APPLICABLE","emailResubscribeStatus":"NOT_APPLICABLE","isInsideCrossOriginFrame":false,"source":"forms-embed-1.3938","sourceName":"forms-embed","sourceVersion":"1.3938","sourceVersionMajor":"1","sourceVersionMinor":"3938","_debug_allPageIds":{"embedContextPageId":"42224642964","analyticsPageId":"42224642964","pageContextPageId":"42224642964"},"_debug_embedLogLines":[{"clientTimestamp":1697187409579,"level":"INFO","message":"Retrieved pageContext values which may be overriden by the embed context: {\"pageTitle\":\"Smartphones and tablets : An open door to ransomwares\",\"pageUrl\":\"https://blog.pradeo.com/mobile-security-ransomware?utm_medium=email&_hsmi=278111799&_hsenc=p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio&utm_content=278111799&utm_source=hs_email\",\"userAgent\":\"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.70 Safari/537.36\",\"urlParams\":{\"utm_medium\":\"email\",\"_hsmi\":\"278111799\",\"_hsenc\":\"p2ANqtz-8eQdbTBSxsj-0IsORQ33AggJo7F0jeFmRqqlTcClDW6DHghW1zHklxTLJap_KHIW3c-VeinC6M2YKyqL5yD8G6g_klamdwhUE96rp7uFq-WRRWUio\",\"utm_content\":\"278111799\",\"utm_source\":\"hs_email\"},\"pageId\":\"42224642964\",\"isHubSpotCmsGeneratedPage\":true}"},{"clientTimestamp":1697187409579,"level":"INFO","message":"Retrieved countryCode property from normalized embed definition response: \"DE\""},{"clientTimestamp":1697187409982,"level":"INFO","message":"Retrieved analytics values from API response which may be overriden by the embed context: {\"hutk\":\"a074079965002d245153aedd19cee5db\",\"canonicalUrl\":\"https://blog.pradeo.com/mobile-security-ransomware\",\"contentType\":\"blog-post\",\"pageId\":\"42224642964\"}"}]}"><iframe
name="target_iframe_caf050a8-9ff7-4223-8e7a-0bad8656b2b9_2759" style="display: none;"></iframe>
</form>
Text Content
This website stores cookies on your computer. These cookies are used to collect information about how you interact with our website and allow us to remember you. We use this information in order to improve and customize your browsing experience and for analytics and metrics about our visitors both on this website and other media. To find out more about the cookies we use, see our Privacy Policy. If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference not to be tracked. Accept Decline * Expertise * Pradeo Security Technology * Application Expertise * Data Protection Laws * Solutions PRODUCTS Mobile Threat Defense Mobile App Security Testing In-App Protection Secure Private Store Mobile Threat Intelligence BUSINESS NEEDS UEM / MDM Security BYOD security Enrich SIEM USE CASES Government Banking & Insurance Pharmaceutical Logistic Energy * Resources * Solution datasheets * Customer Case Studies * Integration datasheets * White Papers, Reports & Studies * Webinars * Marketplace * Company * About us * Our team * Awards * Jobs * Blog * Contact * en * FR * DE TOPICS * Select a Topic * All * Mobile Security * Mobile Application Security * Cybersecurity * Expertise * Security Alert * Partners * Corporate * Events * News * cyberattack * predictions STAY UP TO DATE SUBSCRIBE TO OUR BLOG STAY UP TO DATE Email* Notification Frequency cyberattack SMARTPHONES AND TABLETS : AN OPEN DOOR TO RANSOMWARES By Romain Chassere on May, 10 2023 The FBI's Internet Crime Complaint Center reported recently a 62% year-over-year increase of ransomware attacks. At a time when we hear more often than ever about this threat in the global media, it should be noted that ransomwares are not new, but currently gaining a lot of popularity among cybercriminals. Today, a wide variety of public and private organizations are attacked. However, for cybercriminals the most suitable targets are those with poor IT hygiene, in fruitful sectors or whose activity continuance is critical. Quite often, public organizations' cyberdefense budgets are not adapted to the criticality of the information they handle. Thus, they are particularly affected by threats such as ransomwares. When the criticality of some devices is underestimated, as it is often the case with smartphones and tablets, hackers' access is facilitated. EVOLUTION OF RANSOMWARES In the recent months, two new trends have emerged. On the one hand, it has been observed that ransomwares are often used as part of large-scale attacks, sometimes prepared months in advance and targeting carefully selected companies or public institutions (critical sector, high added value...). Qualified as Big Game Hunting, these onslaughts are often carried out by teams of hackers who have more financial and/or human resources than the average. The second trend is the opposite of the first. It is the widespread of Ransomware-as-a-Service offers on the dark web, aimed at people with little IT knowledge and looking for a simple and fast way to launch attacks. The Jigsaw ransomware, for example, is sold for about 3,000 dollars on cybercriminal forums. RaaS is available on a subscription basis and sometimes offers a management platform like any SaaS solution to monitor attacks. Much less powerful than Big Game Hunting, RaaS usually targets individuals or small businesses, randomly. HOW CAN A RANSOMWARE INFILTRATE YOUR SYSTEM? INFECTION METHODOLOGY To deploy a ransomware on an organization's information system, cybercriminals use fleets of computers, smartphones or tablets. Often, they use phishing and software vulnerabilities. Phishing email Operable on a large scale for free, email is a favoured way to spread ransomwares. A recent study conducted by Pradeo in Q4 2020 shows that 34% of employees click on the link presented in phishing attempts sent by text message (email, SMS or via messaging applications). Source : ANSSI - State of ransomware Malicious or hijacked web page Some websites mimic known company pages or display a false window to entice Internet users to download a program, for example, claiming a security flaw in the OS or a required update. The program is actually a malware. Source : ANSSI - State of ransomware threat Vulnerabilities exploitation * Server: Some network vulnerabilities can be exploited to spread malware. In 2020, a vulnerability in Citrix products allowed malicious individuals to execute code remotely. * Software: Security holes in softwares can facilitate access to corporate data. For example, the democratization of VPN services makes them a target of choice and some are victims of brute force attacks to obtain administrators' credentials. ENCRYPTION AND RANSOM DEMAND When installed on a device connected to an information system, ransomwares quarantine security and remote management programs, and then encrypt local and remote files, connected disks, etc. Once this step is completed, a ransom is asked. In most cases, hackers demand to be contacted within a given time frame. Beyond that deadline, the encrypted information is erased, sold or published online. However, even if the payment is made (often in cryptocurrency, therefore untraceable), the organization is not sure to recover all of its data. To have an order of magnitude, the amount of a ransom ranges from a few thousand euros for an individual, and varies between 200,000 and 10 million dollars for the DarkSide and WastedLocker ransomwares. HEAVY CONSEQUENCES FINANCIAL LOSSES Ransomwares are intended to extort money. When they are trapped, organizations face a dilemma: should we pay the ransom? Whatever their answer is, they will have to face financial losses related to an untimely shutdown of their activity, a complete clean-up of their information system, investigations to establish the source of the attack, penalties from data protection authorities, etc... DATA LEAKS During a ransomware attack and regardless of the reaction of the victim, data leakage is inevitable. Even when the ransom is paid and the data is restored, the stolen information usually ends up on the black market. FORCED SHUTDOWN A cyberattack often renders the computer system inoperable. It can slow down or even paralyze the activity of the affected organization. In some sectors, this leads to considerable financial losses, in others, such as in the healthcare sector and particularly in hospitals, it directly jeopardizes patients' safety. IMAGE DAMAGES When an organization falls victim to ransomware, or any other attack leading to data leakage, it is difficult to keep it quiet. Sometimes, the legislation requires (in most countries) to notify such incidents to the government agency in charge of data protection. The media coverage of a security breach has serious consequences on a brand image, which can cause a loss of confidence from stakeholders: customers, partners, investors, etc. -------------------------------------------------------------------------------- Prevent ransomware from exploiting your mobile fleet to infect your information system, protect your mobile devices with Pradeo Security. ABOUT THE AUTHOR More from this author ROMAIN CHASSERE RECOMMENDED ARTICLES POPULAR ARTICLES * SMS OTP Authentication: Not As Safe As You May Think * Two spyware tied with China found hiding on the Google Play Store * New malware detected on Google Play, 100.000+ users affected * Malicious app on Google Play drops banking malware on users’ devices * Spyware dubbed Facestealer infects 100,000+ Google Play users STAY UP TO DATE Email* Notification Frequency RECENT ARTICLES * SpyNote malware now targeting banking applications * Pradeo recognized in 2023 Gartner Peer Insights™ Voice of the Customer for Mobile Threat Defense * Two spyware tied with China found hiding on the Google Play Store * Pradeo launches unmatched benefits for MSSPs with its latest Mobile Threat Defense release * Smartphones and tablets : An open door to ransomwares ARTICLES RÉCENTS SpyNote malware now targeting banking applications - 10 May, 2023 Pradeo recognized in 2023 Gartner Peer Insights™ Voice of the Customer for Mobile Threat Defense - 10 May, 2023 Two spyware tied with China found hiding on the Google Play Store - 10 May, 2023 Pradeo launches unmatched benefits for MSSPs with its latest Mobile Threat Defense release - 10 May, 2023 Smartphones and tablets : An open door to ransomwares - 10 May, 2023 TOPICS * Mobile Security (52) * Mobile Application Security (38) * Cybersecurity (26) * Expertise (26) * Security Alert (21) * Partners (19) * Corporate (12) * Events (4) * News (4) * cyberattack (1) * predictions (1) see all GET IN TOUCH WITH MOBILE SECURITY EXPERTS Contact us European leader in mobile security, Pradeo protects business mobile devices and applications. Read More * Resources * UEM security * Use cases * Data protection * Contact us * Mobile Threat Defense * Mobile Application Security Testing * In-App Protection * Secure Private Store * Mobile Threat Intelligence contact@pradeo.com Copyright @ 2022. All Right Reserved. * * *