{"id":2953,"date":"2018-01-16T19:54:49","date_gmt":"2018-01-16T19:54:49","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2953"},"modified":"2021-07-07T04:51:45","modified_gmt":"2021-07-07T08:51:45","slug":"unusual-ransomware-strain-encrypts-cloud-email-real-time","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2953","title":{"rendered":"Avoid A New Strain of Cloud Email Ransomware: Cloud Security Management"},"content":{"rendered":"<p>A <a href=\"https:\/\/en.wikipedia.org\/wiki\/White_hat_(computer_security)\" target=\"_blank\" rel=\"noopener noreferrer\">white hat hacker<\/a> recently developed a working \u201cransomcloud\u201d strain that encrypts cloud email accounts like Office 365 in real-time.\u00a0 A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.\u00a0 <a href=\"https:\/\/www.knowbe4.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">KnowBe4<\/a>\u2019s Chief Hacking Officer <a href=\"https:\/\/mitnicksecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kevin Mitnick<\/a> has produced a live demo to watch the ransomware work below.<\/p>\n<p>According to Kevin, the proof of concept has been around for a while, and is on the horizon; because if a <a href=\"https:\/\/en.wikipedia.org\/wiki\/White_hat_(computer_security)\" target=\"_blank\" rel=\"noopener noreferrer\">white hat<\/a> can create it, so can a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Black_hat\" target=\"_blank\" rel=\"noopener noreferrer\">black hat<\/a>. This strain uses a smart <a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_engineering_(security)\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a> tactic to trick the user into giving the bad guys access to their cloud email account, with the appearance of a \u201cnew Microsoft anti-spam service\u201d.\u00a0 Once the user clicks \u201caccept\u201d, all email and attachments are encrypted in real-time!\u00a0 The ransomcloud attack will work for any cloud email provider that allows an application giving control over the email via oauth.\u00a0 With Google it will work if the app passes their verification process.\u00a0 Outlook 365 doesn\u2019t verify the app at this point, so it makes Microsoft users much more vulnerable to this type of attack.<\/p>\n<p><span style=\"color: #800000;\"><strong>Watch the Demo Here:<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/VX59Gf-Twwo\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>What Kevin recommends near the end of the video: \u201cStop, Look, &amp; Think before you click on any link in an email that could potentially give the bad guys access to your data\u201d is now truer than ever.<\/p>\n<p><span style=\"color: #800000;\"><strong>Source: <\/strong><\/span><a href=\"https:\/\/blog.knowbe4.com\/heads-up-new-ransomware-strain-encrypts-cloud-email-real-time-video\" target=\"_blank\" rel=\"noopener noreferrer\">KnowBe4 Unusual Ransomware Strain Encrypts Cloud Email Real Time<\/a><\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>A white hacker recently developed a working ransomcloud strain that encrypts cloud email accounts like Office 365 in real-time.\u00a0 A scary thought when so many organizations trust the cloud and software manufacturers like Microsoft to keep their information secure.\u00a0<\/p>\n","protected":false},"author":2,"featured_media":8614,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[79,129,362,107,21],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Avoid New Cloud Email Ransomware | Cloud Security Management | TSI<\/title>\n<meta name=\"description\" content=\"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoid New Cloud Email Ransomware | Cloud Security Management | TSI\" \/>\n<meta property=\"og:description\" content=\"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2953\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-16T19:54:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T08:51:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"341\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953\",\"name\":\"Avoid New Cloud Email Ransomware | Cloud Security Management | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png\",\"datePublished\":\"2018-01-16T19:54:49+00:00\",\"dateModified\":\"2021-07-07T08:51:45+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2953\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png\",\"width\":1024,\"height\":341},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2953#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoid A New Strain of Cloud Email Ransomware: Cloud Security Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Avoid New Cloud Email Ransomware | Cloud Security Management | TSI","description":"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Avoid New Cloud Email Ransomware | Cloud Security Management | TSI","og_description":"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2953","og_site_name":"TSI Support","article_published_time":"2018-01-16T19:54:49+00:00","article_modified_time":"2021-07-07T08:51:45+00:00","og_image":[{"width":1024,"height":341,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2953","name":"Avoid New Cloud Email Ransomware | Cloud Security Management | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png","datePublished":"2018-01-16T19:54:49+00:00","dateModified":"2021-07-07T08:51:45+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Discover how cloud-based email accounts may be attacked \u2014 and learn what KnowBe4\u2019s Kevin Mitnick says on how to prevent ransomware attacks.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2953"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2018\/01\/RansomCloud-1140x380-1.png","width":1024,"height":341},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2953#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Avoid A New Strain of Cloud Email Ransomware: Cloud Security Management"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2953"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2953"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2953\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8614"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}