Many of the hackers are now resorting to the conventional and older ransomware infection techniques for maximizing their collection of ransom. These findings were identified by the recent Sophos Labs 2019 Threat Report.
Ransomware may not be a fresh threat but some campaigns like WannaCry have managed to innovate and introduce certain mechanisms where the standard ransomware removal and recovery processes struggled. Usually, what they did was the use of basic automation techniques like malicious file attachments, which were forwarded to a large list of targets.
However, Sophos Report discovered an interesting revelation: manual control was gaining prominence over automation. The thing about manual attacks is that they require considerable time to be effective and if a hacker intends to indulge in a widespread attack; then it is harder to manage. However, the key advantage of these manual customized attacks is that they are more unlikely to be detected with ransomware removal tools.
According to cybersecurity experts, the primary reason behind their success at evading such ransomware removal solutions is their ability to remain “unpredictable” and they are unyielding because hackers continue to reinvent and reshape their campaigns at any hurdles. As the report stated that,
“With targeted attacks, the behavior is inherently unpredictable, and the attackers can respond reactively to defense measures that, at first, thwart them from accomplishing their goal.”
Experts explain that when an automated ransomware strain strikes, it may be disabled instantly after the system manages to detect it. However, manual strains have the ability to improvise .i.e. think at the moment. When hackers are attacking manually, they can instantly initiate a response or move to plan B to infect their victims, if their ransomware is stopped in the tracks. This may refer to use of any command or trying another hacking tool.