This is the most likely time for your business to be hit by ransomware

cybersecurity
(Image credit: Shutterstock)

The FBI has warned that ransomware gangs are increasingly interested in attacking companies that are in the middle of "time-sensitive financial events" such as corporate mergers and acquisitions.

In the private industry notification, the FBI asserts that it has evidence that suggests the online thugs collect financial information before attacks, which they then use as leverage to extort their victims.

“Prior to an attack, ransomware actors research publicly available information, such as a victim’s stock valuation, as well as material nonpublic information. If victims do not pay a ransom quickly, ransomware actors will threaten to disclose this information publicly, causing potential investor backlash,” shared the FBI.

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and we'd hugely appreciate if you'd share your experiences with us.

>> Click here to start the survey in a new window <<

Unraveling the modus operandi of such enterprising cyber criminals, the FBI says that they first sneak in malware that helps them trawl the target’s computer for financially sensitive information, which can be used to arm twist the victim into paying the ransom.

Hitting where it hurts

Impending events that could affect a victim’s stock value, such as major announcements, mergers, and acquisitions, encourage ransomware actors to target a network or adjust their timeline for extortion.

This is evidenced from the fact that most victims of these reconnaissance malware don’t actually end up being targeted by the ransomware. 

The FBI shared a few incidents to back its claims. It shared that between March and July 2020, at least three publicly traded US companies that were actively involved in mergers and acquisitions were victims of ransomware during their respective negotiations. 

Evidence of reconnaissance can be established from the fact that of the three pending mergers, two were under private negotiations.

In the same vein, analysis of the Pyxie remote access trojan (RAT), which often precedes the Defray777/RansomEXX ransomware attack, revealed that the attackers use the RAT to search for files and data that could help influence the victim’s current and near

future stock share price. Threats to publicly expose these files could then make the victims more pliable.

Best practices

The FBI used the notification to reiterate its position that it doesn’t condone paying ransom since it only encourages the threat actor to victimize others. However it understands how businesses that have been crippled by ransomware might not have any other option but to engage with the threat actors. 

It ends the notification by listing a variety of ways businesses can protect themselves from such cyber attacks. For instance, it suggests housing copies of critical data in the cloud or on an external offline hard drive or storage device.

It also advises businesses to install and regularly update antivirus software on all hosts.

Importantly, as it suggests businesses to switch to two-factor authentication (2FA), the FBI urges the use of authenticator apps rather than email, since the attackers might already have compromised the victim email accounts.

“Implement least privilege for file, directory, and network share permissions,” the FBI concludes, as it lists a few other resources to help businesses batten down the hatches.

Business should use one of these best firewall apps and services to protect their networks, and ensure their computers are running these best endpoint protection tools to add another layer of defense against such cyber-attacks.

TOPICS
Mayank Sharma

With almost two decades of writing and reporting on Linux, Mayank Sharma would like everyone to think he’s TechRadar Pro’s expert on the topic. Of course, he’s just as interested in other computing topics, particularly cybersecurity, cloud, containers, and coding.

Read more
Concept art representing cybersecurity principles
How to combat exfiltration-based extortion attacks
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
data recovery
Ghost ransomware has hit firms in over 70 countries, FBI and CISA warn
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Interlock ransomware attacks highlight need for greater security standards on critical infrastructure
A group of 7 hackers, 6 slightly blurred in the background and one in the foreground, all wearing black with hoods pulled up over their heads. You cannot see their faces. The hacker in the foreground sits with an open laptop in front of them. The background, behind the hackers, is a Chinese flag
China government-linked hackers caught running a seriously dangerous ransomware scam
Latest in Security
Hacker silhouette working on a laptop with North Korean flag on the background
North Korea unveils new military unit targeting AI attacks
An image of network security icons for a network encircling a digital blue earth.
US government warns agencies to make sure their backups are safe from NAKIVO security issue
Laptop computer displaying logo of WordPress, a free and open-source content management system (CMS)
This top WordPress plugin could be hiding a worrying security flaw, so be on your guard
Computer Hacked, System Error, Virus, Cyber attack, Malware Concept. Danger Symbol
Veeam urges users to patch security issues which could allow backup hacks
UK Prime Minister Sir Kier Starmer
The UK releases timeline for migration to post-quantum cryptography
Representational image depecting cybersecurity protection
Cisco smart licensing system sees critical security flaws exploited
Latest in News
Ray-Ban Meta Smart Glasses
Samsung's rumored smart specs may be launching before the end of 2025
Apple iPhone 16 Review
The latest iPhone 18 leak hints at a major chipset upgrade for all four models
Quordle on a smartphone held in a hand
Quordle hints and answers for Monday, March 24 (game #1155)
NYT Strands homescreen on a mobile phone screen, on a light blue background
NYT Strands hints and answers for Monday, March 24 (game #386)
NYT Connections homescreen on a phone, on a purple background
NYT Connections hints and answers for Monday, March 24 (game #652)
Quordle on a smartphone held in a hand
Quordle hints and answers for Sunday, March 23 (game #1154)