• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ontario Provincial Police Creates Awareness for Cyberattacks

October 8, 2018Simeon Georgiev

The slew of cyberattacks –– especially ransomware attacks –– has caused widespread damage to the municipal governments in the Canadian state of Ontario. The local police department has been diligently involved in the ransomware removal and recovery processes, prompting them for a recent announcement on the matter at hand.

The department remained discreet regarding the exact number of municipalities that have been attacked by ransomware in Ontario’s territory. However, in recent times, two municipalities have been revealed as victims.

OPP has taken up the mantle for creating awareness regarding ransomware attacks. The reason behind the awareness drive is the lack of public understanding about ransomware attacks. OPP noticed that attacks were not restricted to government systems; several businesses were also targeted.

Regarding the ransom payments, OPP vehemently opposed payments of any kind to the cybercriminals. They explained two reasons behind this resistance. First, paying money to a cybercriminal group only supports the development of the industry. Second, there is no guarantee that paying a ransom can be followed by a ransomware removal procedure.

The department also educated users about how a ransomware works. An official stated that a ransomware attack locks user data permanently and demands money for ransomware removal. The objective behind an attack is the permanent disabling of IT operations so pressure can be mounted on the affected parties for immediate ransom payments. The only solution for the ransomware removal process –– to decrypt the data –– is linked to an encrypted key, which the cybercriminals possess.

Furthermore, the department also briefed about the common ransomware distribution techniques. It was stated that a cybercriminal group enters a network directly through hacking. Similarly, sometimes phishing strategies are used via spam email campaigns for tricking users. The ransom amount is provided via a ransom note that lists the amount in the form of a cryptocurrency –– mostly Bitcoin –– that has to be sent to a cryptocurrency wallet.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post GandCrab Ransomware Attacks a School in Florida Next post How Midland Learned Lessons from Wasaga Beach Attack?

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.