Malwarebytes reports that ransomware detections increased 90% between 2016 and 2017 but that development of ransomware families have grown stale. While ransomware continues to be a threat, trends indicate that state sponsored ‘bad actors’ have shifted their focus towards more traditional delivery methods including use of Trojans, spyware, adware, and hijackers.
The likely motivation behind this move is that there has been a lower return on investment for the groups behind larger ransomware distributions like ‘Wannacry’, ‘Notpetya’, and ‘Badrabbit’. In 2018, these state-sponsored ‘bad actors’ appear to be focusing on malicious web-based cryptomining, that is, software running in an end-user’s browser used for mining Cryptocurrency without consent.
You have to employ a variety of security measures; from a firewall, to malicious website filtering, to network area control with internet protocol security, down to the workstation level where you license next-gen anti-virus technology to help prevent malware, localized exploits, and ransomware.
As always, remain vigilant and if you have suspicions regarding a website, email, or application – don’t immediately click on those links.