The ransomware is not a new threat, although the advancement of technology has brought
sophistication and diversification of the attacks. Until now, cybercriminals sent malware
infections through malicious links or emails, hoping that some user would open the file and
thus be able to encrypt a company's data.
But, despite the fact that this type of malware is still active, the current trend is marked by
attacks on well-known software applications and large corporations, directly affecting backup.
For this reason, more than ever, cloud storage for companies is being so important.
The types of infectious attacks
Today we can differentiate between three types of attacks.
Deletion of backup repositories in the cloud
They are implemented by remote desktop protocols in which cybercriminals steal domain
credentials, encrypt data, and delete files from the backup repository.
They have a great reach. They pick their victims at random, hoping that a user will click on a
malicious link or download a file
Inclusion of 'malware' in the backup
It is not detected. The malware lays dormant and reinfects the system while the backup is
There are companies specialized in blocking and detecting any type of unauthorized malicious
code that tries to penetrate the backup copies in the cloud for companies. This isolates the
malicious file and all information is safely restored.
How to protect cloud backups for business?
The developers of these malicious programs are aware that backup in the cloud is a very
effective defence and that makes them modify the malware in order to remove and track the
Although ransomware was a great threat just a few years ago, evolution has been necessary
and its creators take advantage of the latest vulnerabilities to take action. Using of an
updated antivirus software is must for protection against ransomware. There are several
families and when an exploit is used that infects a system, it can move late