Ransomware 2.0: The Next Evolutionary Stage

The threat of ransomware is ubiquitous today — and it is becoming increasingly sophisticated. Attacks are no longer limited to the encryption of corporate data. The new techniques expected in 2025 take it a step further, specifically targeting companies' backup systems to incapacitate them. Welcome to Ransomware 2.0—a threat that compels us to elevate our data protection to a new level.

Why are backups the target?

In many companies, regular backups are the cornerstone of the IT security strategy, as they allow for data recovery after an attack, thereby limiting damage. Attackers are well aware of this. They increasingly recognize that an effective attack on this “last line of defense” can enhance their chances of a ransom payout. An encrypted network without functional backups often leaves companies with no choice but to comply with the ransom demand — which is precisely the goal of ransomware attackers.

 

The new tactics of Ransomware 2.0

Hackers aim to directly attack backups and specifically destroy them before companies have the chance to restore their data. This is achieved through various advanced techniques:

  • Long Latency Periods:
    Attackers take their time and infiltrate the network undetected before launching the actual attack. This allows them to gain access to backup systems, delete or compromise them, and ensure that recovery options are restricted.
  • Enhanced Encryption:
    Cybercriminals utilize stronger encryption mechanisms and targeted attacks on backup infrastructures, which can even affect redundant backups.
  • Attacks on Isolated Backup Systems:
    This generation of ransomware not only targets the main network but also specifically seeks to infiltrate isolated or externally stored backups.

 

Tips for Defense

To protect against these advanced attacks, companies must adapt their security approaches, especially focusing on the protection of their backup systems. Here are some steps you should take:

  1. Isolated and Secure Backup Solutions:
    Implement a backup system that is fully isolated and separated from the main network. Such “air-gap” solutions provide a strong protective barrier that is more difficult for attackers to breach.
  2. Regular Recovery Tests:
    A backup is only as good as its recoverability. Conduct regular tests to ensure that your data can be restored in an emergency.
  3. Backup Versioning:
    Use backup versioning and multiple recovery points to have a wider selection of data copies available for emergencies.
  4. Access Controls and Monitoring:
    Ensure that only authorized personnel have access to the backup systems and use modern monitoring tools to quickly detect unusual activities.

 

Ransomware 2.0 is a dangerous evolution that targets the core of many contingency strategies: the backup. It is time to make backup solutions more robust and secure to effectively defend against these new threats. An isolated and secured backup system, along with regular recovery tests, is no longer optional but essential. Companies that do not adapt their backup strategies to these threats risk being left without options after an attack. Prepare now and strengthen your last line of defense—before it’s too late.

 

Do you know about immutableVEEAM@MOUNT10?

ImmutableVEEAM is the optimal addition to your backup and recovery concept. You can choose between a 7 or 30-day backup history—your personal deletion protection to ensure that your data cannot be deleted or manipulated due to this security measure.

This allows you to quickly and easily access a previous backup and restore your data in case of an attack.

Your data is automatically and pre-encrypted in Europe’s safest data center—SWISS FORT KNOX I & II.

Interested in learning more about immutableVEEAM@MOUNT10? We are happy to assist you.

Philippe_Desktop-1-aspect-ratio-600-735

Philippe Gmür is your contact person regarding all questions on the subject of backup and housing.

With my many years of experience as a key account manager at MOUNT10, I would be happy to help you with any questions you may have about backup and housing. I look forward to being able to discuss your needs with you in a personal meeting.

Philippe Gmür
Key Account Manager

Further articles

Regelmässige Backups_Blog
The Importance of Regular Backups
09 September 2024
Discover more
QR Code Phishing_Linkedin
Quishing: A New Dimension of Cybercrime
12 September 2024
Discover more
mount10-mountains-1400x600