{"id":378,"date":"2017-01-01T14:31:46","date_gmt":"2017-01-01T14:31:46","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/ransomware-key-insights-from-infosec-experts\/"},"modified":"2019-05-29T12:28:07","modified_gmt":"2019-05-29T12:28:07","slug":"ransomware-key-insights-from-infosec-experts","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/","title":{"rendered":"Ransomware: Key insights from infosec experts"},"content":{"rendered":"<p class=\"wls-paragraph\">Pause for a minute. 2017 has arrived before we even realized it was coming. And it\u2019s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016.<\/p>\n<p class=\"wls-paragraph\">Before we entangle ourselves in everything digital that this year has to offer, it\u2019s important to heed expert advice.<\/p>\n<p class=\"wls-paragraph\">Take ransomware. What does it really entail? Does it even matter \u2013 will it ever actually affect you? It\u2019ll vanish as quickly as it appeared, right?<\/p>\n<p class=\"wls-paragraph\">Wrong. One thing\u2019s for sure: ransomware isn\u2019t going anywhere. As recently reported; cybercrime has <a href=\"http:\/\/www.welivesecurity.com\/2016\/09\/28\/growth-cybercrime-ruthless\/\" target=\"_blank\" rel=\"noopener noreferrer\">wriggled its way into 21st century life<\/a>, wreaking a trail of havoc as it goes.<\/p>\n<p class=\"wls-paragraph\">And it\u2019s growing.<\/p>\n<p class=\"wls-paragraph\">Ransomware is attacking our <a href=\"http:\/\/www.welivesecurity.com\/2016\/02\/15\/us-hospital-hit-random-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">hospitals<\/a>; our <a href=\"http:\/\/www.welivesecurity.com\/2017\/01\/20\/ransomware-attack-hits-st-louis-public-library\/\" target=\"_blank\" rel=\"noopener noreferrer\">libraries,<\/a>&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2015\/12\/28\/cybercriminals-targeting-banks-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">and our financial institutions<\/a>. It\u2019s attacking our trendy new <a href=\"http:\/\/www.telegraph.co.uk\/technology\/2016\/03\/23\/hackers-can-unlock-and-start-dozens-of-high-end-cars-through-the\/\" target=\"_blank\" rel=\"noopener noreferrer\">connected cars<\/a>. As ESET\u2019s Stephen Cobb envisions, what if it sets its sights on Internet of Things (IoT) devices?<\/p>\n<p class=\"wls-paragraph\">Fortunately, the experts are on our side. Here, we\u2019ve rounded up key advice and insight they have provided within the last year.<\/p>\n<h2><b>RoT: Ransomware of Things<\/b><\/h2>\n<p class=\"wls-paragraph\"><b>Stephen Cobb, senior security researcher at ESET<\/b><\/p>\n<p class=\"wls-paragraph\">Golden rule: <a href=\"http:\/\/www.welivesecurity.com\/author\/scobb\/\" target=\"_blank\" rel=\"noopener noreferrer\">Don\u2019t put anything on the internet you wouldn\u2019t want your mother to see<\/a>.<\/p>\n<p class=\"wls-paragraph\">Cobb warns of the impact of a yet unknown concept. His concern is that \u201c<a href=\"http:\/\/www.welivesecurity.com\/2017\/01\/25\/rot-ransomware-things\/\" target=\"_blank\" rel=\"noopener noreferrer\">malicious software that seeks to take control of a device<\/a>\u201d \u2013 or \u201cjackware\u201d, as he calls it \u2013 may infiltrate 2017.<\/p>\n<p class=\"wls-paragraph\">During midwinter in 2016 in Finland, where temperatures were below freezing, cybercriminals were able to take control and halt <a href=\"http:\/\/www.welivesecurity.com\/2016\/12\/30\/biggest-security-incidents-2016\/\" target=\"_blank\" rel=\"noopener noreferrer\">the heating of two buildings<\/a> during a distributed denial of service attack. Could these attacks become commonplace as the IoT continues to flourish?<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88638\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_478523059-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_478523059-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_478523059-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_478523059-1-65x42.jpg 65w\" alt=\"Men regulate temperature on control panel of central heating or DHW at combi boiler in restroom.\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">Cobb believes there needs to be a collective international effort made, on both a technical and political level, to stop the IoT giving way to the RoT. \u201cTraditional security techniques like filtering, encrypting, and authenticating can consume costly processing power and bandwidth,\u201d he points out. \u201cThere has been a collective international failure to prevent a thriving criminal infrastructure evolving in cyberspace.\u201d<\/p>\n<p><span class=\"block_quote_right\">\u201cMore than 40% of American adults remain unconvinced that IoT devices are safe.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">The good news is we\u2019re not falling for anything we\u2019re not sure about. Cobb cites a report from a <a href=\"https:\/\/www.eset.com\/us\/about\/newsroom\/corporate-blog\/new-esetncsa-survey-explores-the-internet-of-stranger-things\/\">survey<\/a> showing that more than 40% of American adults remain unconvinced that IoT devices are safe.<\/p>\n<p class=\"wls-paragraph\">He questions: \u201cCould the combination of consumer sentiment and government guidance lead companies to make the IoT more resistant to abuse?\u201d<\/p>\n<h2><b>Ransomware: should you pay up?<\/b><\/h2>\n<p class=\"wls-paragraph\"><b>David Harley, senior research fellow at ESET<\/b><\/p>\n<p class=\"wls-paragraph\">Golden rule: <a href=\"http:\/\/www.welivesecurity.com\/author\/ant49honey\/\" target=\"_blank\" rel=\"noopener noreferrer\">Scepticism is a survival trait: don\u2019t assume that anything you read online is gospel truth, even in this adage<\/a>.<\/p>\n<p><span class=\"block_quote_right\">\u201cIf you give in and pay the ransom, you\u2019ve directly contributed to the wellbeing of criminality&nbsp;\u2026&nbsp;And there\u2019s unlikely to be a money-back guarantee.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\">To pay (cybercriminals demanding a bitcoin ransom), or not to pay, that is the question.<\/p>\n<p class=\"wls-paragraph\">Such is the current state of the modern world.<\/p>\n<p class=\"wls-paragraph\">On the morality of paying a ransom to cybercriminals who\u2019ve attacked your system and encrypted your data, there\u2019s a multitude of opinions around. \u201cThere\u2019s an undeniable argument that if you give in and pay the ransom, you\u2019ve directly contributed to the wellbeing of criminality,\u201d <a href=\"http:\/\/www.welivesecurity.com\/2016\/08\/22\/ransomware-pay-not-pay-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">concedes<\/a> David Harley. \u201cAnd there\u2019s unlikely to be a money-back guarantee.\u201d<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-88639\" src=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_327094073-1.jpg\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" srcset=\"http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_327094073-1.jpg 640w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_327094073-1-300x192.jpg 300w, http:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/01\/shutterstock_327094073-1-65x42.jpg 65w\" alt=\" Hand with money and keys\" width=\"640\" height=\"410\"><\/p>\n<p class=\"wls-paragraph\">However, he recognizes that often it\u2019s not that straightforward: \u201cIn many cases, it\u2019s cheaper to pay up than lose the data \u2026 Maybe the damage is so severe that you go out of business. You can\u2019t blame companies if they decide to pay up rather than commit financial suicide.<\/p>\n<p class=\"wls-paragraph\">\u201cIt might be seen as being more responsible to pay up rather than destroy the livelihoods of all staff.\u201d<\/p>\n<p class=\"wls-paragraph\">His own personal advice is that \u201cprevention (and backup) is worth a ton of Bitcoins\u201d.<\/p>\n<p class=\"wls-paragraph\">Whatever your stance on the issue, the solution remains to follow the advice of experts such as Harley himself, and Lysa Myers.<\/p>\n<h2><b>What can you do about ransomware?<\/b><\/h2>\n<p class=\"wls-paragraph\"><b>Lysa Myers, <\/b><b>security researcher at ESET <\/b><\/p>\n<p class=\"wls-paragraph\">Golden rule: <a href=\"http:\/\/www.welivesecurity.com\/author\/lysa\/\" target=\"_blank\" rel=\"noopener noreferrer\">An ounce of prevention is worth a pound of cure<\/a>.<\/p>\n<p class=\"wls-paragraph\">\u201cIf you have properly prepared your system,\u201d <a href=\"http:\/\/www.welivesecurity.com\/2016\/10\/10\/ransomware-expert-advice-keep-safe-secure\/\" target=\"_blank\" rel=\"noopener noreferrer\">says<\/a>&nbsp;Myers, \u201c[ransomware] is really nothing more than a nuisance.\u201d<\/p>\n<p class=\"wls-paragraph\">We have selected five precautions she advises taking, by means of the aforementioned prevention.<\/p>\n<p><span class=\"block_quote_right\">\u201cIf you have properly prepared your system,&nbsp;ransomware is really nothing more than a nuisance.\u201d<\/span><\/p>\n<p class=\"wls-paragraph\"><b>1. Back up your data \u2013 on an external drive that is<i> disconnected from your devices and network when not in use<\/i><\/b><\/p>\n<ul>\n<li>This is the single most important thing you can do.<\/li>\n<\/ul>\n<p class=\"wls-paragraph\"><b>2. Keep your software up to date<\/b><\/p>\n<ul>\n<li>Use reputable software repositories for both anti-malware software <b>and<\/b> a software firewall.<\/li>\n<\/ul>\n<p class=\"wls-paragraph\"><b>3. Disable macros in Microsoft Office files<\/b><\/p>\n<ul>\n<li>By doing so, you deactivate the use of the scripting language used by malware.<\/li>\n<\/ul>\n<p class=\"wls-paragraph\"><b>4. Display hidden file extensions \u2013 and look for double extensions<\/b><\/p>\n<ul>\n<li>Windows and OSX hide known file extensions. Malware takes advantage of this.<\/li>\n<\/ul>\n<p class=\"wls-paragraph\"><b>5. Filter EXE files in email; and disable RDP and files running from AppData \/ LocalAppData folders<\/b><\/p>\n<ul>\n<li>Behavior used by ransomware often manifests itself in the above.<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">Ransomware \u201ccan be extremely scary\u201d, but it can be tackled with education and awareness. Myers ends on a positive note: \u201cIf anything good can come out of this ransomware trend, it is an understanding of the importance of performing regular, frequent backups to protect our valuable data.\u201d<\/p>\n<p class=\"wls-paragraph\">&nbsp;Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/01\/31\/ransomware-key-insights-infosec-experts\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pause for a minute. 2017 has arrived before we even realized it was coming. And it\u2019s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016. Before we entangle ourselves in everything digital that this year has to offer, it\u2019s important to heed expert advice. Take<\/p>\n","protected":false},"author":5,"featured_media":1744,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,151,153],"tags":[],"class_list":["post-378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-expert-opinion","category-hacking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Ransomware: Key insights from infosec experts - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: Key insights from infosec experts\" \/>\n<meta property=\"og:description\" content=\"Pause for a minute. 2017 has arrived before we even realized it was coming. And it\u2019s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016. Before we entangle ourselves in everything digital that this year has to offer, it\u2019s important to heed expert advice. Take\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-01T14:31:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Ransomware: Key insights from infosec experts\",\"datePublished\":\"2017-01-01T14:31:46+00:00\",\"dateModified\":\"2019-05-29T12:28:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/\"},\"wordCount\":902,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_524060560-1-623x410.jpg\",\"articleSection\":[\"cybercrime\",\"expert opinion\",\"hacking\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/\",\"name\":\"Ransomware: Key insights from infosec experts - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_524060560-1-623x410.jpg\",\"datePublished\":\"2017-01-01T14:31:46+00:00\",\"dateModified\":\"2019-05-29T12:28:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_524060560-1-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_524060560-1-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: Key insights from infosec experts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/01\\\/01\\\/ransomware-key-insights-from-infosec-experts\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware: Key insights from infosec experts - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware: Key insights from infosec experts","og_description":"Pause for a minute. 2017 has arrived before we even realized it was coming. And it\u2019s brought with it an army of new buzzwords, fresh security threats and an even more switched-on world than 2016. Before we entangle ourselves in everything digital that this year has to offer, it\u2019s important to heed expert advice. Take","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-01-01T14:31:46+00:00","article_modified_time":"2019-05-29T12:28:07+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Ransomware: Key insights from infosec experts","datePublished":"2017-01-01T14:31:46+00:00","dateModified":"2019-05-29T12:28:07+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/"},"wordCount":902,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg","articleSection":["cybercrime","expert opinion","hacking"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/","name":"Ransomware: Key insights from infosec experts - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg","datePublished":"2017-01-01T14:31:46+00:00","dateModified":"2019-05-29T12:28:07+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_524060560-1-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware: Key insights from infosec experts"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/01\/01\/ransomware-key-insights-from-infosec-experts\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=378"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1744"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}