{"id":51495,"date":"2016-07-27T16:54:00","date_gmt":"2016-07-27T23:54:00","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=51495"},"modified":"2025-06-06T01:15:49","modified_gmt":"2025-06-06T08:15:49","slug":"taking-steps-to-fight-back-against-ransomware","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/","title":{"rendered":"Taking Steps to Fight Back Against Ransomware"},"content":{"rendered":"<p>Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy to develop, simple to execute, and does a very good job of compelling users to pay to regain access to their precious files or systems. Almost anyone and every business is a potential victim. More important, to the delight of extortionists, people are paying.<\/p>\n<p>Ransomware exists in several forms. The weakest can lock an Internet browsing session with intimidating warnings of government surveillance and demands for\u00a0immediate payment. These rely on fear tactics and deny the user the ability to easily navigate away from the warning page, thus appearing to have locked the system. This threat can often be solved by simply closing the browser and restarting. This method is how many of the original ransomware schemes began, but it did not result in much financial gain for criminals.<\/p>\n<p>The use of encryption to lock selected user files is now the most common approach. Attackers either compromise the system via exploitation or simply by persuading the user via social engineering into launching malicious software. Either way, the malware seeks specific file types and encrypts them with a public key. The malware notifies the victims that many files are encrypted and they must pay to receive the associated private key to unlock them. Users are directed to send cryptocurrency to anonymous accounts. This practice has proven very successful because\u00a0the encryption strength is exceptionally strong and the targeted files are meaningful to the victims.<\/p>\n<p>The third type of ransomware also leverages encryption, but targets operating system files, effectively holding the entire boot sequence hostage. The malware encrypts the master boot record, and deletes Windows shadow copies and other system-recovery capabilities.<\/p>\n<p>Ransomware is a relatively new method of attack that can rarely be stopped by traditional security controls. Attack methods include phishing, maliciously configured websites and online ads, Trojans embedded in downloads, compromised devices, and poisoned email attachments. Ransomware\u00a0represents a shift in tactics from traditional data breach exfiltration and website-distributed denial-of-service attacks. Ransomware undermines the integrity of specific files and systems, placing them under control of the adversary, rather than jeopardize the confidentiality or general availability of an environment. This change in tactic is troublesome for the current generation of security tools and practices, which are struggling to adapt to the new threat.<\/p>\n<h2><strong>Industry forecast<\/strong><\/h2>\n<p>Ransomware has risen dramatically during\u00a0the past couple of years.\u00a0 The <em><a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-cybersecurity-predictions-report-examines-growth-integrity-attacks\/\">McAfee Labs Threats Report March 2016<\/a>,\u00a0<\/em>from McAfee, counts\u00a0more than six\u00a0million unique samples of ransomware in the wild. Industry experts believe ransomware will remain a major and rapidly growing threat in 2016 and beyond. The financially motivated actors relish their great triumphs with this approach and the significant sums of money being made. Research by the <a href=\"https:\/\/cyberthreatalliance.org\/cryptowall-executive-summary.pdf\">Cyber Threat Alliance showed one variant in 2015, CryptoWall 3<\/a>, caused an estimated US$325 million in losses. This success fuels technical advancements, attracting more attackers, strengthening support infrastructures, and enhancing targeting techniques.<\/p>\n<p>Cybercriminals, large and small, have fully embraced ransomware. Attackers canvas broad audiences with indirect campaigns, indiscriminately seeking easy targets. Floods of phishing emails, malicious ads that\u00a0lead to infected sites, and Trojans embedded in applications infect the unsuspecting. A wide range of common file types are encrypted and a relatively low ransom is set to make the option of paying more attractive. Separately, some threat agents apply direct targeting techniques that\u00a0single out specific victims. They may create customized and elaborate phishing campaigns, waterhole attacks, or directly exploit system vulnerabilities to compromise individual hosts. Attackers can target victims through the use of exploit kits\u2014such as <a href=\"https:\/\/www.csoonline.com\/article\/555957\/the-expanding-landscape-of-exploit-kits.html\">Angler, Magnitude, and Nuclear\u2014<\/a>to deliver ransomware payloads like <a href=\"https:\/\/threatpost.com\/major-campaigns-spreading-cryptxxx-ransomware-via-exploit-kits\/117738\/\">CryptXXX and Locky<\/a>. Exploit kits allow ransomware to run, target files most valued by that particular victim, and establish a high ransom.<\/p>\n<p>Technically, the encryption algorithms and implementation techniques of ransomware have become stronger. Early variants were easily undermined by security professionals due to poor implementations, but nowadays most ransomware code is at a level that\u00a0cannot be broken by anticryptographic methods or by identifying weaknesses in key management. Ransomware developers also bundle their code with more features and capabilities. Advanced malware can see whether it is running in a security sandbox, establish secure connections to control infrastructures, use unique public key infrastructure key pairs for each victim, combine multiple infection techniques, establish backdoors for later use, and destroy the system if attempts are made to evict the code. Attackers are creative and will maximize every opportunity. For example, the <a href=\"https:\/\/threatpost.com\/latest-petya-ransomware-strain-comes-with-a-failsafe-mischa\/118072\/\">Petya ransomware was recently updated to include Mischa<\/a> code. Petya attempts to encrypt the master boot record, but if it fails it reverts to using Mischa as a file-encrypting scheme. Ransomware also mixes with botnets to amplify its\u00a0reach. The Dridex botnet is well known to spread <a href=\"https:\/\/www.securityweek.com\/dridex-botnet-spreading-locky-ransomware-javascript-attachments\">Locky<\/a> and <a href=\"https:\/\/threatpost.com\/cerber-ransomware-on-the-rise-fueled-by-dridex-botnets\/118090\/\">Cerber<\/a> ransomware.<\/p>\n<p>For the foreseeable future, ransomware will remain a major and rapidly growing threat, fueled by anonymizing networks and payment methods.\u00a0The business models and infrastructure underpinning ransomware are becoming stronger. Most of these attacks continue to use Bitcoin to anonymously transfer funds from victims to the criminals. Popular anonymous networks, such as TOR, mask the location and owners of the control servers. With so much money at stake, attackers realize they are getting a lot of attention from law enforcement agencies, and they work very hard at remaining in the shadows. Other advances include less-than-scrupulous developers who offer the software and hosting services to upstart criminals seeking to enter the ransomware arena. Ransomware-as-a-Service is now a real business opportunity. Anyone can purchase or rent such a service; the infrastructure host will handle all the back-end procedures in return for a slice of the profits. This partnership allows for specialization and the recruitment of less technical fraudsters to join in the activities.<\/p>\n<p>At its core, ransomware is about extorting money. Although targeting consumers who blunder into their traps will continue, the most\u00a0sophisticated threats target industries that must maintain access to crucial data and are willing to pay large sums. So far in 2016, the healthcare sector is one of several that\u00a0has been aggressively targeted. Medical facilities need access to systems, care devices, and patient records. Several hospitals have been specifically targeted by\u00a0ransomware, causing disruption to services. Transportation, financial, and legal sectors are other fields that\u00a0share a similar profile and are now targets. New technology will also be victimized. As consumers and businesses rely on new devices and services, that reliance creates an opportunity for this type of extortion. Imagine getting into your smart car to drive home and seeing a ransomware screen. With vehicle operations blocked, you are now effectively stranded. How many people would pay a small &#8220;fee&#8221; to get their car started?<\/p>\n<h2><strong>Advice for fighting ransomware<\/strong><\/h2>\n<p>Ransomware is very challenging to combat. No one solution or practice can solve the problem. The ransomware development community is very agile in countering defenses introduced by security vendors. They will look for easy victims, targets with value, and work to exploit new technologies to keep the money flowing in their direction.<\/p>\n<p>The best defense is to stop ransomware before it arrives on a system, or block an attacker\u2019s attempts to gain access. The next best opportunity is to detect the malware and rapidly evict it before it can cause\u00a0damage. Malware must be downloaded before it can launch, which provides a narrow window of opportunity to contain the threat if it can be detected in time. Rapid detection, however, is difficult because\u00a0adaptive attackers are very successful at creating problems for security.<\/p>\n<p>Once ransomware starts, the situation quickly gets grim. Most ransomware infections encrypt files in a way not recoverable without the private key, held by the extortionist. Even if victims pay the ransom, there is no guarantee they will get their files back, as they are dealing with untrustworthy parties.<\/p>\n<p>Recovery from ransomware is painful, expensive, and time consuming. If backups are available, then the best option is to remove the infected media and start fresh. Reusing infected drives is not recommended for any severe malware infection because it is nearly impossible to know if everything is safe. It is better for everyone, especially businesses, to start with a new drive, a fresh operating system, and restored uninfected data files. For consumers, this fresh start may not be reasonable due to cost or technical challenges, leaving them with cleaning and reusing the infected drive.<\/p>\n<p>Many choose to move on without the encrypted files. They may not be that important, can be recreated, or the victims choose to suffer and learn from the experience. Paying the ransom is not recommended. Cooperating with extortionists is no guarantee of decrypted files. What is certain, however, is that victims who pay will be recognized as willing to pay, making them a preferred target in the future.<\/p>\n<h2><strong>Best practices to protect against ransomware<\/strong><\/h2>\n<p>The following recommendations provide a good measure of protection against ransomware. However, as the threats constantly evolve, so must the defenses we present.<\/p>\n<p>Ransomware attacks are a highly visible problem and a growing global threat to businesses, governments, and consumers. Security and technology vendors are working to undermine this new tactic by cybercriminals, but progress is difficult. Businesses and consumers should proactively take steps to minimize the risks and impacts. Those who don\u2019t are likely to feel the sting of future ransomware attacks.<strong>\u00a0<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,4452,338,180,4549],"coauthors":[4136],"class_list":["post-51495","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-cybersecurity","tag-endpoint-protection","tag-malware","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Taking Steps to Fight Back Against Ransomware | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Taking Steps to Fight Back Against Ransomware | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-27T23:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T08:15:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Protections5.png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Taking Steps to Fight Back Against Ransomware\",\"datePublished\":\"2016-07-27T23:54:00+00:00\",\"dateModified\":\"2025-06-06T08:15:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\"},\"wordCount\":1585,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"computer security\",\"cybercrime\",\"cybersecurity\",\"endpoint protection\",\"malware\",\"ransomware\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\",\"name\":\"Taking Steps to Fight Back Against Ransomware | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-07-27T23:54:00+00:00\",\"dateModified\":\"2025-06-06T08:15:49+00:00\",\"description\":\"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Taking Steps to Fight Back Against Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Taking Steps to Fight Back Against Ransomware | McAfee Blog","description":"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Taking Steps to Fight Back Against Ransomware | McAfee Blog","og_description":"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-07-27T23:54:00+00:00","article_modified_time":"2025-06-06T08:15:49+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Protections5.png","type":"","width":"","height":""}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Taking Steps to Fight Back Against Ransomware","datePublished":"2016-07-27T23:54:00+00:00","dateModified":"2025-06-06T08:15:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/"},"wordCount":1585,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["computer security","cybercrime","cybersecurity","endpoint protection","malware","ransomware"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/","name":"Taking Steps to Fight Back Against Ransomware | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-07-27T23:54:00+00:00","dateModified":"2025-06-06T08:15:49+00:00","description":"Ransomware is an attack in which malware encrypts files and extorts money from victims. It has become a favorite among cybercriminals because it is easy","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taking-steps-to-fight-back-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Taking Steps to Fight Back Against Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51495","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=51495"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51495\/revisions"}],"predecessor-version":[{"id":215167,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/51495\/revisions\/215167"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=51495"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=51495"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=51495"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=51495"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}