Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service
Understanding the Real Threat of RansomwareCybersecurity Specialist John Walker on How Attackers Work
Cyber extortion through digital means is nothing new, says U.K.-based cybersecurity expert John Walker, but the concerning aspect of today's ransomware attacks is that they are "low-cost in the macro sense and so easy to achieve."
See Also: Live Webinar | Education Cybersecurity Best Practices: Devices, Ransomware, Budgets and Resources
Walker implores organizations to build a robust offline backup strategy and not simply rely on online backups.
He says that when criminals gain access to an organization's environment, "they're taking it very, very slowly and carefully, and mapping from the inside. When they're ready to understand your infrastructure and your architecture, and say where your online backups are or your SAN-attached backups are, then they know where they can encrypt everything."
In a video interview with Information Security Media Group, Walker discusses:
- Misconceptions around our understanding of ransomware;
- Known vulnerabilities that cybercriminals exploit to inject ransomware;
- Why having a robust offline backup strategy is important.
Walker is a visiting professor at Nottingham Trent University. He serves on the advisory board for the Kent Interdisciplinary Research Center in Cyber Security - KirCCS - at the University of Kent, and he formerly served in Royal Air Force security and counterintelligence.