Cyber ransom andÂ extortion, is a growing trendÂ in context of overallÂ cyber attacks. According to Check Pointâ€™s Global Threat Intelligence Trends Report, ransom attacks increased from 5% to over 10% of all malware attacksÂ during the second half of 2016.
Hackers use ransom malware to take over a system and hold it hostage. They demand payment, and threaten to delete or share your information publicly. Typically, the cost isÂ low enough to make it more effective to simply pay the ransomÂ in lieu ofÂ losingÂ valuableÂ or sensitiveÂ data, paying fines,Â or risking reputationalÂ damage.
In its report, Check Point identifies the most common types of ransom malware as Conficker, Sality, Cutwail, JBossJMX and Locky.Â In addition, the most commonÂ type of mobile malware is Hummingbad, which accounted for 60% of all attacks on Android phones or devices.
The main source of ransom attacks begin with spam and target phishing emails.
For more information,Â please see:Â Roi Perez "Check Point: Ransomware % of malware doubled in second half of 2016."Â www.checkpoint.com
Â (Feb. 21, 2017).