cryptojacking

Coronavirus brings spike in cyberattacks

In light of the unfortunate and devastating spread of the COVID-19 pandemic – and the spike in cyberattacks in its wake – the need for cyber protection is even clearer. That need is particularly acute for the people and companies who had fallen behind in the cybersecurity race due to budget constraints or lack of attention.

Now that individuals are deeply stressed, cybercriminals are using every angle of attack, including playing on the natural fear of COVID-19 and the desperate search for information. In the last two weeks, Acronis has seen a significant increase in cryptojacking, while ransomware attacks are growing rapidly as well. 

Acronis Active Protection discovers AutoIt cryptomining campaign

The Acronis Security Team was one of the first to identify a new cryptomining campaign targeting the attrib.exe Windows process. Learn how our team detected the spike in crytomining attacks, how the AutoIt cryptomining malware works, and how Acronis Active Protection - built into Acronis cyber protection solutions - helps to keep your systems protected. 

Acronis Cyber Dragon and the basics of cyber protection

The modern world is more dependent upon data than at any time in history. That means safeguarding data – and the applications and systems that rely on data – is vital for individuals and organizations alike.

Unfortunately, traditional backup and cybersecurity solutions are no longer enough because they cannot keep up with today’s threats. The world needs modern solutions that can protect data, applications, and systems.

Acronis has been advocating a new approach called cyber protection, which combines the best of data protection with innovative approaches to cybersecurity, while incorporating technologies that ensure the privacy and authenticity of data.

Let’s explore the basics of cyber protection.

National Cybersecurity Awareness Month

October is a month dedicated to many worthy causes, including breast cancer awareness, bullying prevention, arts and humanities, and (ahem) pizza. It’s also National Cyber Security Awareness Month (NCSAM).

Here at Acronis, every month is cybersecurity awareness month, but in the interest of promoting this worthy campaign, we’d like to note a few recent cybercrime trends and offer some best practices for protecting yourself from them.

Hurricane Dorian shows why cyber protection is vital to disaster preparedness

Faced with cyberthreats like ransomware and cryptojacking, it’s no surprise modern organizations have focused on their cybersecurity posture. Yet Hurricane Dorian shows that storms, floods, and fires still threaten a company’s digital assets just as seriously as hackers do.

Backup without cybersecurity is no longer enough. But cybersecurity without data protection isn’t enough either.

A recent IDC whitepaper revealed that cyber protection – which combines proven data protection and cutting-edge cybersecurity – provides an effective strategy against both digital and physical threats.

NioGuard Triple-A Rating Cover

Cryptojacking – or illicit cryptomining – continues to be a major headache for companies and home users, with research showing that cybercriminals made an impressive $52.7 million by mining digital coins on victims’ machines during the first half of 2019.

NioGuard Security Lab, a member of Anti-Malware Testing Standard Organization (AMTSO), researched the matter and just posted a report that examines the level of protection against cryptojacking offered by leading endpoint security providers.

The results might shock some observers because Acronis, which now defends against illicit mining in its data protection solutions, outperformed the vast majority of leading endpoint security providers.

Plurox cryptomining malware 11

Cryptojacking attacks are not going away any time soon. Instead, they’re becoming more sophisticated – and more dangerous – by using advanced modular malware with worm capabilities as a delivery mechanism. A complex backdoor, called Plurox, was recently discovered by MalwareHunterTeam. It has a pluggable architecture and is able to spread itself over a local network, with the help of the EternalBlue exploit, and start cryptominers downloaded from the command and control (C&C) server.

 

Acronis Now Offers Backup for G Suite and Cryptomining Protection for Businesses

With two newly released updates, Acronis takes its cyber protection capabilities for businesses to an exciting new level, allowing IT pros and business managers to focus on other priorities and rest even easier knowing their data is safe. The latest updates add integrated G Suite protection to Acronis’ existing backup and recovery services for more than 20+ platforms, plus built-in protection against cryptojacking, one of the fastest-growing malware threats.

Let’s take a closer look at how Acronis strengthened its cyber protection capabilities for businesses that take advantage of Acronis’ cloud offerings, Acronis Backup Service and Acronis Backup Cloud.

In case you missed it, Microsoft issued a warning last Friday to alert users that they might experience issues with the upcoming May 2019 Update for Windows 10 (version 1903) – and the issues are difficult to avoid. The good news is that Microsoft’s proactive communications means you can take precautions to protect your data before you initiate the update.

Use these seven tips to manage any changes ahead, whether it’s a standard Win 10 update, if your one of the 35% of companies upgrading from Win 7, or you’re coping with any future system update.
 

Protect infrastructure by blocking obvious vulnerabilities

In 1966, Robert F. Kennedy delivered a speech that cited an ancient Chinese curse: “May [you] live in interesting times.” He continued, “Like it or not, we live in interesting times. They are times of danger and uncertainty, but they are also the most creative of any time in the history of mankind.”

That measured perspective, simultaneously seeing the glass as half-empty and half-full, is a useful one to adopt when considering infrastructure vulnerabilities in 2019.