ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Lowlife Ransomware Hackers Now Asking for More Than $1k Per Attack

Ransomware remains a very real threat, and is arguably only getting worse. Attacks are now able to come more frequently, and there are opportunities for even relative amateurs to level an attack against some unfortunate victim. However, this is not to say that there is nothing you can do to keep your business from becoming another cautionary tale.

Ransomware, in review:
First of all, it’s important to understand exactly what ransomware is. A form of malware, ransomware will infect your system and encrypt your data. It gets its name from the fact that the attacker will demand a ransom in order for your data to be decrypted. What’s worse, if you pay, you’re taking the distributor at their word that they will decrypt your data once the money has changed hands.

Understandably, this form of ransomware can be a highly potent weapon against many users, who simply won’t know how to handle the situation beyond paying and hoping for the best. Of course, since the motives behind ransomware are financial, a lot is directed towards business targets, as they not only have more funds available but are also heavily reliant on their data to function.

Ransomware repercussions
The nature of ransomware means that those that distribute it can usually name their price for the decryption key. After all, it isn’t as though victims have anywhere else to turn other than the hacker (or so the hackers want them to believe). Due to this, ransoms for encrypted data have shot up--in 2015, the ransom to decrypt an infected computer would cost about $294, on average. That price had jumped to average $1,077 per computer in 2016.

In addition to this increase in ransom demands, there was a 36 percent higher rate of ransomware attempts between 2015 and 2016, 68 percent targeting consumers. This left a still-considerable 32 percent being leveraged towards businesses.

Does it get worse? Sure does.
As if it wasn’t bad enough already, ransomware is now able to be utilized by just about anybody who has a grudge or a desire for some extra cash. Ransomware is now offered as-a-Service, allowing an attack to potentially come from far more sources than before. Some variants of ransomware, such as Karmen, will only cost an aspiring cyber criminal $175 to cash in on.

Thankfully, there are steps being taken to eliminate the threat of ransomware. For instance, there are decryption tools to help undo the damage that Karmen can cause because it was derived from the open-source ransomware project Hidden Tear. Other tools and resources are available to help identify which ransomware has infected a given system, like this one from security researcher Michael Gillespie.

However, there are also steps that you can take to avoid a ransomware infection, like following best security practices and computing mindfully. ClearView IT is here to assist you in putting these procedures in place, as well as helping you recover should ransomware strike. Give us a call at 866-326-7214 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Data Recovery Communication Managed IT Services Productivity Quick Tips VoIP Users Social Media Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Covid-19 Disaster Recovery Passwords Holiday Apps Managed Service Windows 10 IT Support Browser Cloud Computing Outsourced IT Miscellaneous Managed Service Provider Data Management Remote Work Internet of Things Government Operating System Saving Money Gadgets Networking Artificial Intelligence Windows Workplace Strategy Managed IT services Bandwidth Information Encryption Server App Virtualization Spam Blockchain Remote Business Technology Mobile Device Management WiFi Apple Information Technology Gmail Office History Two-factor Authentication Office 365 Budget Employee/Employer Relationship Cybercrime Access Control Data Security Big Data Health Wi-Fi BDR Analytics Conferencing Cost Management Compliance Voice over Internet Protocol Vendor Document Management Help Desk Patch Management Hacking Employer-Employee Relationship Save Money Remote Monitoring Hacker Remote Computing IT Management Training Augmented Reality Word IBM Mobile Office Legal Website Applications Search... Managed Services Best Practice Data storage Vulnerabilities Retail Alert Project Management Hiring/Firing Outlook BYOD Money Password Data loss Computing Customer Service Unified Threat Management Vendor Management Firewall Hard Drive iPhone Education Twitter Cortana VPN Mobile Computing Content Filtering Data Breach Law Enforcement Update Remote Workers Marketing End of Support Printer Windows 7 Running Cable Router Free Resource Storage Paperless Office The Internet of Things YouTube Monitoring Antivirus How To Travel Healthcare Maintenance Virtual Reality Social Engineering Windows 11 Cryptocurrency Laptop Black Market Cleaning User Websites Robot Meetings Mobility Social Sports SaaS DDoS Chrome Google Maps Scam Virtual Machines Chromebook Drones PowerPoint Virtual Assistant Computer Repair Disaster Administration Automobile Professional Services Presentation Tech Terms Specifications Lithium-ion battery How To Microchip Managed IT IT Consultant Digital Flexibility Processor Managed Services Provider Processors Customer Relationship Management Taxes Co-Managed IT Virtual Private Network Identity Theft Entertainment Hack Notifications Unified Communications Current Events Multi-factor Authentication Solutions Google Docs Bluetooth Physical Security Distributed Denial of Service Integration Wireless Technology Saving Time Office Tips Images 101 Memory eWaste Display Private Cloud Bitcoin Computers Start Menu HIPAA Computer Care Downtime Downloads Safety Telephone Employees Avoiding Downtime Politics Vulnerability Settings Machine Learning Holidays Virtual Desktop Software as a Service Excel Experience Data Protection Solid State Drive Cooperation Video Conferencing Medical IT Telephone System Regulations Shopping Corporate Profile Paperless Visible Light Communication SQL Server Reading Directions Knowledge Monitors Point of Sale Backup and Disaster Recovery Television Content Telephony Windows 8 Desktop Employer Employee Relationship PCI DSS Licensing Humor Electronic Medical Records Electronic Payment Shortcuts Accountants Cabling Gig Economy Database Tablet Business Communications Advertising G Suite Internet Service Provider Azure Relocation Recovery Displays Competition Mouse Work/Life Balance VoIP Tech Support Tracking Regulations Compliance Managed IT Service Memes LiFi Health IT Entrepreneur Be Proactive Equifax Phone System Tactics Human Resources Hard Drive Disposal Web Server Net Neutrality Documents Application SharePoint Username Business Intelligence Digital Payment Financial Data In Internet of Things Freedom of Information IT Hacks Network Congestion Workplace Strategies Startup Worker Risk Management Addiction Access Google Apps email scam Reliable Computing Securty Navigation Writing Domains Time Management Mobile Security Public Cloud Computer Accessories Telework News Communitications Microsoft 365 User Tip Legislation Smartwatch Network Management Spyware Procurement Scalability Evernote Audit Administrator Text Messaging Proactive IT File Sharing FinTech Fake News IT Assessment Bring Your Own Device Proxy Server Redundancy Smart Technology Emails CES Public Speaking Service Level Agreement Cache Computing Infrastructure Supply Chain Management Value Streaming Media Management Unified Threat Management Music Device security Workers Organization Cyber security Microsoft Excel Smart Devices Keyboard Wireless Headphones Hard Drives Going Green Troubleshooting Business Cards CCTV Remote Working Tech Printing Botnet Error Touchscreen intranet AI Trend Micro Computer Malfunction Electronic Health Records Transportation Rental Service Wireless Bookmark Emergency Micrsooft Shortcut Supply Chain Digital Security Cameras Flash Heating/Cooling Download Vendor Mangement Environment Piracy Wasting Time Term Windows XP Modem Telephone Systems Business Growth Social Networking HTML Samsung eCommerce Videos Webcam Surveillance Browsers Workplace Nanotechnology Uninterrupted Power Supply Upload Business Mangement Business Owner Software License Managing Costs Google Play SSID Banking Social Network Google Wallet Tablets Media Development Employer/Employee Relationships Messenger Data Analysis Deep Learning Scams Screen Reader Google Calendar Trends Mobile Technology Supercomputer Virtual Machine Security Cameras Optimization Business Metrics Customer Resource management Virus Hosted Solution Devices Reviews 2FA Tip of the week Motion Sickness Teamwork Books Staffing Fileless Malware Cables Comparison Language IP Address Gamification Google Drive Inbound Marketing Society Company Culture Data Storage Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?