All that cybercriminals need to attack a company’s systems and encrypt all the data is to find a gap in the information security system.
Firewalls with open ports, careless screening of attachments sent by e-mail, and administrative users with weak passwords are some of the thousands of security holes through which crackers/hackers can invade a network of servers and computers.
Due to the large number of well-known companies that have been attacked in recent years, such as Sony, Adobe, and eBay, we can conclude that the simple fact of being connected to the Internet already makes us possible victims of these cybercriminals.
The financial damage caused by cyber attacks runs by billions of dollars. Ransoms are paid via cryptocurrencies (Bitcoin – BTC or Monero – XMR).
When paying the ransom, victims realize the great difficulty in finding and arresting the criminals, because due to cryptocurrencies being untraceable, it is unfortunately not possible to know who and where those receiving the money are.
The amounts charged by hackers vary depending on the size of the company and importance of the data. File Servers, Database Servers, Servers, Storages, and RAID systems are always in the sights of cybercriminals, as they allocate the most sensitive data of companies.