MSP Blog Logo

Cyber Security

Business Growth

Sales and Marketing

IT Services


Empowering Your MSP Business to Grow and Prosper—One Post at a Time


Featured Post

The Ultimate Guide to Success in Managed IT Services

What are the fundamentals to building a profitable managed IT services business? Keep reading to discover the four key ingredients for success.

Read Now

A Look Back at 2016: The Year of Ransomware

Posted February 16, 2017by Ben Barker

A Look Back at 2016-The Year of Ransomware.png

2016 had a lot of notable headlines. Whether it was the UK voting to Brexit, the popularity of "Pokémon GO," or the summer Olympics in Brazil, last year left no shortage of water cooler material. However, what isn't often talked about is the impact that cybercrime had on the world in 2016. As far as the tech space is concerned, last year was like nothing we have ever seen before. So, while the aforementioned headlines may have dominated the mainstream news cycles, 2016 was, by all measures, the year of ransomware.

Recently, we held a webinar with Webroot titled, "2016: The Year of Ransomware - Encryption by Any Means Possible." In the webinar, Tyler Moffitt, Senior Threat Research Analyst with Webroot, reviewed the top IT security headlines of 2016. Additionally, Moffit reviewed attack vectors, detailed current top ransomware, made predictions for 2017 and even outlined five quick tips for stopping ransomware. But, for the purposes of this post, let's take a look at Tyler's top headlines of 2016.


Hackers Access SWIFT to Steal $81 Million and Erase Evidence

A hack discovered by BAE Systems revealed that SWIFT, a global financial messaging service that banks use to move millions of dollars and documents across the boarders, had been compromised. Hackers were able to install malware that allowed them to delete records of transfers and steal millions without being detected. How did they get caught? After successfully pulling off transfers of $1-2 million at a time, a single $81 million transfer raised a red flag. Had the hackers continued to withdraw smaller amounts, they may have gone on a lot longer without being detected.

Mirai Source Code Released 

Another 2016 eye-opener came when Mirai, the same malware that was used in the October DDoS attack on, was released to the public on Hack Forums. Essentially, Mirai continuously scans the internet for IoT devices and logs into them using factory default pass codes. Once access is gained, large amounts of network traffic – spoofed to look legitimate – is sent to the target's servers, shutting down the site. This type of malware is especially tough to detect because the devices still perform as they are supposed to. Infected systems can be cleaned by rebooting, but since the scanning is happening at such a rapid rate, devices can become compromised again very quickly. In fact, a test run using a honeypot with a factory default pass code showed that devices are being hacked at an average of 90 seconds after reboot!

Ukranian Power Grid DDoS Attack

Rounding out the list of 2016 headlines is the DDoS attack that successfully took down a Ukrainian power grid. More than 250,000 residents were left in the dark after being hit twice in one calendar year. Additionally, the Mirai Botnet bricked nearly 1 million routers from a German ISP. This left the routers inoperable and needing to have the firmware reset or replaced. This attack proved just how large-scale the fallout from DDoS attacks can be.

In reviewing the top cybersecurity stories of 2016, it's plain to see that ransomware left a lasting impression. In fact, there were plenty of victims that wish they could have stayed out of the headlines. Check out the image below for a view of the corporate data breaches from 2016.

Screen Shot 2017-02-14 at 2.04.24 PM.png

This post covers just a portion of what Tyler Moffitt discussed in his webinar.

Handpicked for you:

Ben is a Boston-based tech marketing expert, and an avid Boston sports fan.

Topics: Cyber Security

RMM 101: Must-Haves for Your IT Management Solution
MSP Guide to Managed Services SLAs  [white paper]
comments powered by Disqus