• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ransomware hits a local furniture store in Vermont

September 17, 2018Simeon Georgiev

In one of our recent blogs, we discussed how cryptovirological operators are resorting to low-profile attacks to make the most out of their activities. A ransomware attack on a local furniture store in Vermont has once again confirmed this newly developed trend among ransomware operators.

According to the store’s owner, they never suffered a cyber attack in two decades of their operations. The store management came to know about the attack after the employees couldn’t access the sales information stored on the targeted computer. They immediately contacted their IT guy to find out the problem with the system. At first, the manager couldn’t understand when IT guy told him that the system had been affected by a ransomware attack.

It shows that a lot of people still don’t know about the cyber threat that involves ransom payment. Nevertheless, the store decided against paying the attackers and commenced their own ransomware removal measures. Customer names, addresses and contact details from last 10 years got compromised in the attack.  Fortunately, banking cards details remained safe from the cryptovirological activity of the ransomware.

Since the store is removing the ransomware only with the help of its local IT guy, therefore it hasn’t succeeded in restoring the complete system yet. It looks like the furniture store has lost some of its data forever.

With the incidents like these, the benefits of going for low-profile ransomware assaults become quite apparent. Digital fronts of local brick and mortar stores are easier to target since no layered firewalls and anti-ransomware software applications protect them. In addition, the staffer at local ventures doesn’t have adequate information regarding the social engineering tactics used by cryptovirological operators. Lastly, such stores are not aware of third-party ransomware removal services. Therefore, they are more inclined to pay the attackers to get back their data.

 

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post BitPaymer ransomware hits PGA Next post Glutton ransomware: A variant from Scarab family

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.