adopt e-phishing techniques to mislead attackers and disrupt ransom attacks




An information security expert asks companies to adopt e-phishing techniques to mislead attackers and disrupt ransom attacks

This comes in the wake of the ransom attacks known as “WannaCry”.
Google + LinkedIn Facebook Twitter
The health sector information security expert and other sectors have called for immediate action in the aftermath of the recent WannaCry ransom attacks, which have hurt individuals and destinations around the world, urging companies to adopt modern technology designed to disrupt e-ransom attacks, The traps and methods of phishing e-mislead the attackers.

Ray Cavite, vice president of Attivo Networks in the Middle East, Turkey and Africa, a specialist in cyber defense, cybersecurity and e-scams, said the British health sector was affected by recent attacks. The attacks not only prohibited doctors from accessing patients’ files, Emergency rooms are for people who need urgent health care.

“The malware behind this attack appears to be exploiting a vulnerability in the Microsoft Windows program that the US National Security Agency (NSA) is supposed to have identified for use in gathering its information and recently leaked to the Internet,” he said.

“There are solutions in the market today that can isolate ransom attacks immediately after the attacker tries to access the network. Atifu’s interactive defense techniques have been tested in their labs and these techniques have slowed the encryption process 25 times,” Cavite said. “Our network solutions to ransom attacks begin with a motion sensor that warns the organization of attackers who are trying to encrypt the drive or exploit the vulnerability of the Windows server block, where drives are set up as network drives and designed with a highly interactive technology to attract attackers to assets Rather than real drives, and this solution slows down and blocks ransom attacks by deceiving attackers to delude success, distracting them from real assets. ”

He stressed that attracting the attention of the ransom attackers provides the electronic security institutions with sufficient time to respond and isolate the infected system from the network and prevent the spread of attacks, stressing the importance of modern technology designed to disable electronic ransom attacks, which is based on making traps and methods of deceiving the electronic to mislead the attackers,

He pointed out that technology based on matching signatures and formal patterns can miss new types of ransom attacks, and even alerts are often lost in what appears to be a benign alert, lost amid many data records.

He advised early adopters to be introduced to early detection mechanisms. Companies using e-phishing technology were notified of any breaches within the network and provided with tools to speed up electronic incident response. In case of violations, phishing techniques automate the containment of the infected system.


In: A Technology & Gadgets Asked By: [22655 Red Star Level]

Answer this Question

You must be Logged In to post an Answer.

Not a member yet? Sign Up Now »

Star Points Scale

Earn points for Asking and Answering Questions!

Grey Sta Levelr [1 - 25 Grey Star Level]
Green Star Level [26 - 50 Green Star Level]
Blue Star Level [51 - 500 Blue Star Level]
Orange Star Level [501 - 5000 Orange Star Level]
Red Star Level [5001 - 25000 Red Star Level]
Black Star Level [25001+ Black Star Level]