Wed, Jun 24, 2020

Kroll Experts Discuss Trojan-Deployed Ransomware Attacks

A study by Kroll, a division of Duff & Phelps identified a growing trend in the use of the Qakbot trojan, or Qbot, by cyber criminals to launch email thread hijacking campaigns that deploy ransomware attacks. In an article for Cointelegraph, Laurie Iacono and Cole Manaster, Vice Presidents in Kroll’s Cyber Risk practice, discuss how the Qakbot trojan is reportedly being used as a “point of entry” by the operators behind the ProLock ransomware gang.

Laurie and Cole highlight that cyber criminals are aware of the increasing cyber security training across email users, and are producing more sophisticated and authentic-looking phishing lures. They caution that, as the COVID-19 pandemic continues to disrupt the global marketplace, opportunistic bad actors are increasingly utilizing trojans to deploy ransomware attacks to lure individuals into clicking malicious links and thereby breach an organization’s system, steal their data and profit by holding both systems and data ransom. 

Read the full article here.

.



Cyber and Data Resilience

Incident response, digital forensics, breach notification, security strategy, managed security services, discovery solutions, security transformation.

Cyber Risk Assessments

Kroll's cyber risk assessments deliver actionable recommendations to improve security, using industry best practices & the best technology available.

Data Protection Officer (DPO) Consultancy Services

Kroll's data privacy team provide DPO consultancy services to help you become and stay compliant with regulatory mandates.


Data Breach Call Center Services

A notification letter can generate lots of questions for those affected by a data breach. Kroll’s call center services are provided by skilled representatives who know how to handle difficult questions and stand at the ready to serve your breached population.

Cyber Policy Review and Design

Ensure that your cyber security policy has the appropriate controls needed to keep your organization's information secure with a remediation plan in place in the event of an incident.