A form of ransomware dubbed NotPetya is currently spreading around the world. Ransomware is a growing threat. Just a couple of months ago a strain called WannaCry crippled the British National Health Service for several days. And now NotPetya is infecting computers with relative impunity. So here’s everything you need to know about the NotPetya ransomware.
Nonprofit organizations handle volumes of sensitive data every day. From client records, to donor information and confidential emails, along with hundreds of other transactions.
With cloud based technology solutions like Office 365, users can access and share data from anywhere, on any device, and be more productive by using all of its collaboration features. On the other hand, it’s easier to inadvertently share sensitive information with others both inside and outside of your organization. Last year nearly half of businesses were attacked with ransomware, causing 34% of enterprises to lose revenue and 20% to cease operations immediately. With nonprofits being routinely faced with limited financial resources, few can afford the costs associated with retrieving their stolen data. Below are some tips to protect your nonprofit from a ransomware attack.
With the recent public service announcement from the FBI, ransomware and cyber security has become serious business for nonprofits. Not only do they need to protect themselves from attacks, but they have a responsibility to protect sensitive client and donor data. Here are the three most common attacks scammers will employ.
As of February 2016, there is a new strain of malware circulating the internet, hidden in infected Microsoft Word documents. This ransomware, known as “Locky,” arrives in an user’s inbox as an email with a Microsoft Word document attached, containing malicious macros. Once enabled, the macros will scramble and encrypt files and the user must either pay a ransom, or hope that a recent backup will prevent any lost data.
How to Identify an Email Containing Locky
According to KnowBe4’s security awareness training blog, an email with ransomware will have a subject line similar to "ATTN: Invoice J-99223146" and a message such as "Please see the attached invoice and remit payment according to the terms listed at the bottom of the invoice." The content of the word document will appear scrambled and illegible with various fonts and symbols, and the top of the document will prompt the user to enable macros in order to read the document.
Screenshot of infected word document, courtesy of KnowBe4: