Security
Headlines
HeadlinesLatestCVEs

Headline

Quantum Ransomware Strikes Quickly, How to Prepare and Recover

NYC-area cybersecurity expert shares the anatomy of a Quantum Ransomware attack and how to prevent, detect and recover from a ransomware attack, in a new article from eMazzanti Technologies.

DARKReading
#web#microsoft#git#auth

HOBOKEN, N.J., May 11, 2022 /PRNewswire-PRWeb/ – A NYC area cyber security consultant breaks down the recent cyber security threat, quantum ransomware, in a new article on the eMazzanti Technologies website. The informative article first relates how the threat first surfaced two years ago as MountLocker.

The author then explains the anatomy of a typical Quantum ransomware attack. He offers four strategies for preventing and detecting attacks followed by ransomware recovery tips, including having a well-documented incident response plan in place.

“In one of the fastest ransomware attacks yet reported, attackers moved from initial attack to ransomware deployment in under four hours,” stated Almi Dumi, CISO, eMazzanti Technologies.

“Understanding attack patterns can help organizations mount more effective cyber defenses.”

Below are a few excerpts from the article, “Quantum Ransomware Strikes Quickly, How to Prepare and Recover.”

Familiar Ransomware Rebranded…With a Twist

“While Quantum has made headlines in recent days, the ransomware actually surfaced two years ago. Known initially as MountLocker, it was rebranded as Quantum in August 2021 when the encryptor began adding .quantum file extensions. Like other ransomware operations, it takes over networks, compromising servers, encrypting files, and bringing work to a halt.”

Anatomy of a Typical Quantum Ransomware Attack

“While Quantum attacks leave scant time to react, knowing how typical attacks occur helps organizations with both prevention and mitigation. For instance, in recent Quantum ransomware attacks, infection occurred through a phishing email. While seemingly from a legitimate source, the email included IcedID malware embedded into an attached ISO file.”

Strategies for Preventing and Detecting Attacks

“Implement 24/7 security monitoring - Successful defense depends on catching suspicious activity immediately. Implement continuous, automated monitoring to identify anomalies and take appropriate action.”

Quantum Ransomware Recovery Tips

“Another critical component of a recovery plan involves data backups. Without solid backups, organizations may have to choose between losing critical data and cooperating with threat actors. Implement automated backups, test them regularly and store a copy offline to keep it safe from attack.”

Ransomware Experts

To successfully recover from ransomware, business leaders must involve the right players. Partner with security personnel who are well-versed in ransomware recovery and have the right tools at hand. They may also need to involve the FBI, cyber breach lawyers, communications personnel, and insurance providers.

The cyber security experts at eMazzanti provide the tools and experience needed to implement a comprehensive security strategy. From monitoring to email filtering and end user training, they help business leaders stop malware earlier and recover quickly in the event of infection.

Have you read?

Useful Microsoft Teams Features You Need to Know

Are Cyber Insurance Policies Part of our new Normal?

About eMazzanti Technologies

eMazzanti’s team of trained, certified IT experts rapidly deliver increased revenue growth, data security and productivity for clients ranging from law firms to high-end global retailers, expertly providing advanced retail and payment technology, digital marketing services, cloud and mobile solutions, multi site implementations, 24×7 outsourced network management, remote monitoring, and support.

eMazzanti has made the Inc. 5000 list 9X, is a 4X Microsoft Partner of the Year, the #1 ranked NYC area MSP, NJ Business of the Year and 5X WatchGuard Partner of the Year! Contact: 1-866-362-9926, [email protected] or http://www.emazzanti.net Twitter: @emazzanti Facebook: Facebook.com/emazzantitechnologies.

Related news

Transforming SQL Queries Bypasses WAF Security

A team of university researchers finds a machine learning-based approach to generating HTTP requests that slip past Web application firewalls.

Black Hat Asia: Firmware Supply-Chain Woes Plague Device Security

The supply chain for firmware development is vast, convoluted, and growing out of control: patching security vulnerabilities can take up to two years. For cybercriminals, it's a veritable playground.

StackHawk Raises $20.7 Million in Series B Funding for Developer-First Application and API Security Testing

Round co-led by Sapphire Ventures and Costanoa Ventures to accelerate product leadership and market growth.

Cloud Firm Appian Awarded $2B in Trade Secret Cyber-Theft Lawsuit

Cloud competitor found liable for breaking into Appian back-end systems to steal company secrets.

On the Air With Dark Reading News Desk at Black Hat Asia 2022

This year's Black Hat Asia is hybrid, with some sessions broadcast on the virtual platform and others live on stage in Singapore. News Desk is available on-demand with prerecorded interviews.

Threat Actors Are Stealing Data Now to Decrypt When Quantum Computing Comes

The technique, called store-now, decrypt later (SNDL), means organizations need to prepare now for post-quantum cryptography.

Android 13 Tries to Make Privacy and Security a No-Brainer

With its latest mobile OS update, Google aims to simplify the adoption of Android’s protective features for users and developers alike.

Orca Security Unveils Context-Aware Shift Left Security to Identify and Prevent Cloud Application Security Issues Earlier

Enterprises can now ship more secure code to production by unifying security across software development, DevOps, and security teams.

Keeper Security Partners with SHI International for New Fully Managed IT Service (SHI Complete)

The partnership integrates Keeper's zero-knowledge, zero-trust enterprise password manager (EPM) into SHI Complete, a comprehensive, fully managed IT service for small and medium-sized businesses (SMBs).

Concentric AI Raises Series A Funding Led by Ballistic Ventures to Autonomously Secure Business-Critical Data

Round of $14.5M to support team of AI experts and cybersecurity leaders targeting overshared data with AI-based solutions for data access governance and loss prevention.

Material Security Reaches $1.1 Billion Valuation for ‘Zero Trust’ Security on Microsoft and Google Email

Founders Fund leads $100 million Series-C financing, gaining the email security startup unicorn status two years after its launch.

DARKReading: Latest News

2 Zero-Day Bugs in Microsoft's Nov. Update Under Active Exploit