Open Nav
Sign Up

Don’t Let Hackers Hold Your Business for Ransom

Oran Cohen

April 13, 2020

Ransomware is on the rise. It’s one of the biggest dangers facing small and medium-sized businesses (SMBs) today, especially as it doesn’t differentiate between the recently recruited intern and the seasoned CEO. Anyone can be fooled into opening that malicious attachment. So much so that ransomware is predicted to reach US$20 billion by 2021.

Furthermore, attackers have learned that the most profitable route is to target small businesses with low ransom demands ranging from $300 to $2000. This is within the realm of affordability even for SMBs and in most cases will be paid to offset the cost of downtime and getting up and running again. And with ready-made ransomware kits available on the “darknet” for deployment at the attacker’s will, can we even argue that crime doesn’t pay? Not only does ransomware pay, but it’s also a far safer way of stealing money than holding up a gas station!

Another reason small businesses provide a prime target for ransomware attacks is they usually lack the sophisticated computer defenses and complex IT policies of large corporations. Consequently, SMBs are very vulnerable. An overwhelming majority (Intel claims as many as 80 percents) of SMBs do not have sufficient data protection or email security. Scarily, according to the National Cybersecurity Alliance, 60 percent of SMBs that have been attacked will close their doors within six months of the attack. In short, the fate of a business could rest on the results of a single misplaced mouse click.

To Pay Or Not To Pay

Coughing up the ransom after an attack may result in getting your data back. But there have been plenty of cases where the decryption key hasn’t arrived or where it has failed to effectively unlock the encrypted files. Demanding a ransom is far from legitimate business practice, and therefore it shouldn’t be a surprise when malware authors fail to honor their end of the bargain. They can (and often do) take your money and run, with no fear of repercussion.

So, with this firmly in mind, what is our best option to prevent ransomware? Well, the operative word here is “options.” After all, malware protection on your gateway (firewall) isn’t enough. Ransomware on a home laptop is likely to transfer to a corporate network, and so the best prevention takes the form of a multi-layered approach.

Operating System Updates

Installing vendor issued updates is by far and away the best way to keep ransomware at bay. Case in point is May 2017’s Wannacry outbreak which spread by exploiting a vulnerability that Windows has patched two months earlier. Those who patched were spared. Those who did not felt the wrath of a state sponsored cyberattack the likes of which had not been seen till then. Just a few weeks later, a second catastrophic attack known as NotPetya struck using the same vulnerability. This time the costs were in the hundreds of million US dollars.

Anti-Virus Software

Traditional anti-virus software compares the unique aspects of a virus against a huge database of known viruses. If the virus hasn’t been previously encountered it won’t appear on the database and consequently won’t be detected. Today’s next-generation anti-virus software employs additional tools in the fight against malware, including isolation of unknown software or suspicious files, protecting important systems from possible infection. The heuristic analysis examines what processes suspicious files are running. If their conduct appears questionable, such as encrypting user documents, the processes will be stopped in their tracks and removed.

User Permissions

If your system user has “administrator” permissions, consider removing them. Web browsing, opening documents, and other regular work activities while logged in as an administrator could put system files and networked resources at risk.

File Permissions

The fewer files any single user has access to, the less a ransomware attack is able to “infect” a computer. If a sales guy doesn’t need access to the financial files, then denying him permission to them will help prevent both an intentional internal attack (which is unfortunately far too common) and also an unintentional attack.

Backup

Correctly versioned backups can protect your data against more than just ransomware. Theft, fire, flood, or accidental deletion can all have the effect of bringing your business to a resounding halt. Make sure your backed-up data is encrypted so only you can restore it. And if you back up to an external hard drive, make sure it’s unplugged from your machine when not in use.

Disaster Recovery

Disaster Recovery doesn’t just function as a failover for your operations in case of hardware malfunction. It can also double as your insurance policy for surviving a ransomware attack. It will help you get up and running more quickly if a breach occurs.

Testing Your Defenses

Since ransomware, malware, and phishing attacks often arrive in user mailboxes, running simulations can increase employees’ sensitivity to these fraudulent emails. If employees know what to look out for, they are far more likely to think twice before clicking on potentially harmful payloads.

For more information on how our offensive services can help protect your organization from attacks, please contact Shay Pinsker at shay@op-c.net, or visit our website.

Resources highlights

CVE-2025-33073: Windows SMB Client Improper Access Control Added to CISA’s KEV

CVE-2025-33073 is a high-severity vulnerability in the Windows SMB client that enables an authenticated remote attacker to escalate privileges to NT AUTHORITY\SYSTEM by abusing a…

Read more >

CVE-2025-33073

F5 Breach: Source Code & Vulnerabilities Stolen by Nation-State Actor

In August 2025, U.S. cybersecurity vendor F5 Networks uncovered a long-term intrusion by a nation-state-linked threat actor that compromised its BIG-IP product development and engineering…

Read more >

f5 breach

CVE-2025-41244: Chinese Threat Actors Actively Exploiting VMware Tools & Aria Vulnerability

CVE-2025-41244 (CVSS 7.8) is a local privilege escalation vulnerability in VMware Tools and VMware Aria Operations when the Service Discovery Management Pack (SDMP) is enabled.…

Read more >

CVE-2025-41244

CVE-2025-32463: Critical Sudo Privilege Escalation

CVE-2025-32463 is a critical local privilege escalation in the ubiquitous sudo utility. The bug allows a local user to escalate to root by abusing sudo’s…

Read more >

CVE-2025-32463

Cisco IOS and IOS XE SNMP Zero-Day Actively Exploited (CVE-2025-20352)

Cisco disclosed CVE-2025-20352, a stack overflow in the SNMP subsystem of IOS and IOS XE, now confirmed as actively exploited in the wild. Attackers can…

Read more >

CVE-2025-20352

SolarWinds Web Help Desk (WHD) Unauthenticated RCE Patch-Bypass (CVE-2025-26399)

SolarWinds released Web Help Desk 12.8.7 Hotfix 1 to fix CVE-2025-26399, an unauthenticated remote code execution flaw in the AjaxProxy component caused by unsafe deserialization.…

Read more >

CVE-2025-26399
Under Cyber Attack?

Fill out the form and we will contact you immediately.