Skip to main content
  • Login
  • Support
  • Partnerships
    • Partnerships Overview
    • Solution Provider Program
    • Technology Alliance Program
    • Distributor Program
N-able
  • Request a Quote
  • Try Now
    • N-able RMM
    • N-able N-central
    • N-able Backup
    • MSP Manager
    • N-able Mail Assure
    • N-able Passportal
    • N-able Risk Intelligence
    • N-able Take Control
Request quote
N-able
  • Products
    • Monitoring & Management
    • N-central Automate. Tackle complex networks. Get remote monitoring and management built for efficiency and scale.
    • RMM Start fast. Grow at your own pace. Try this powerful but easy remote monitoring and management solution.
    • Backup
    • Backup Get data protection for servers, workstations, applications, documents, and Microsoft 365 from one dashboard.
    • Security
    • EDR Defend against ransomware, zero-day attacks, and evolving threats with endpoint detection and response.
    • Mail Assure Leverage mail protection and archiving to keep your users safe from email threats and downtime.
    • Passportal Adopt and enforce best practices for password and documentation management with ease.
    • Tools & Services
    • MSP Manager Increase helpdesk efficiency with a robust PSA, ticketing, reporting, and billing management solution.
    • Take Control Help support customers and their devices with remote support tools designed to be fast and powerful.
    • View All
  • Solutions

    Solutions

    • Security Protect your customers and expand your business by offering layered security services without the complexity.
    • Monitoring Choose the right remote monitoring and management solution to meet you where you are and grow with you.
    • Operational Efficiency Boost profits by improving efficiency via automation, resources and training, and time-saving products.
    • IT Departments Keep your organization productive by easily managing IT from a single, easy-to-use, web-based dashboard.
    • Remote Monitoring Solutions Comparison Compare N-able RMM and N-central side by side. Sign up to talk to a specialist to find the right fit.
    • View All
  • Resources
    • Download
    • Resource Library
    • Product Information
    • Free Tools
    • Learn
    • MSP Institute Webinar Series
    • Daily Live Demos
    • MSP Advice Project
    • Ask the N-central Experts
    • Upcoming Webcasts
    • Connect
    • Blog
    • Security Resource Center
    • Events
    • RMM Foundations Training
  • About
    • Company
    • About Us
    • Leadership
    • Careers
    • News & Press
    • Awards & Recognition
    • Support & Policies
    • Customer Success
    • Customer Support
    • Legal
    • Security
    • Get in Touch
    • Contact
    • Get a Quote
    • Worldwide Sales & Support
  • IT Departments
  • Contact Sales
    • Contact Sales
    • General Inquiry
    • Get a Quote
    • Worldwide Sales & Support
    • Talk to Specialist
    • Security Solutions
    • Monitoring Solutions
    • Operational Efficiency
  • Try Now
    • Monitoring & Management
    • N-central
    • RMM
    • Backup
    • Security
    • EDR
    • Mail Assure
    • Passportal
    • Tools & Services
    • MSP Manager
    • Take Control
SolarWinds MSP is becoming Read More
Filter Blogs
  • Filter by:
  • MSP Business
    • Automation
    • Backup & Disaster Recovery
    • Security-series
    • Best Practices
    • Business
    • Business Growth
    • Business Risk
    • Cloud Computing
    • Customer Service
    • Cybersecurity
    • Cybersecurity Awareness Month
    • Data
    • GDPR
    • Internet of Things
    • IT Support
    • ITSM
    • LOGICcards
    • Machine Learning
    • Mail
    • Managed Services
    • Marketing
    • Mobile
    • Networking
    • Operations
    • Podcast
    • Product
    • PSA
    • Remote Management
    • Research & Trends
    • Risk Intelligence
    • Security
    • Security Vlog
    • Service Desk
    • Services & Support
    • The Head Nerds
    • Tips & Advice
    • Training
Home Blog MSP Business Mail Email Security Education: Avoiding Ransomware 
Mail

Email Security Education: Avoiding Ransomware 

By Mia Thompson
28 May, 2020

Please note: For privacy reasons, the identity of the hacked accounts in the examples used for this blog have been changed or hidden.

CTA Image

N-able Mail Assure

Advanced Threat Protection for Inbound and Outbound Email.

Try It Free Learn More

In last month’s email security education blog, we highlighted the impact of COVID-19 on the current threat landscape and how threat actors are taking advantage of users working from home who want to know more about the virus. Though this trend continues to rise, these are not the only campaigns you should be wary of. The SolarWinds® Mail Assure threat intelligence team continues to observe the latest malicious campaigns threat actors use to exploit user vulnerability. 

These attacks include malware, ransomware, spoofing, and display name spoofing. Cybercriminals often use email as a delivery mechanism for malicious cyberattacks like these. All it takes is one click on a malicious link to download ransomware, illicit cryptomining software, or spyware onto an endpoint. An attack could then propagate out to other machines. From there, it could potentially take down the entire network and damage a company’s reputation in the process. 

MSPs are key targets for ransomware attacks as they provide threat actors with a route to access all their clients. In fact, last year saw an MSP pay $150,000 in bitcoin for a ransomware recovery. In today’s blog, we will look at ransomware attacks on email. 

So, what is ransomware and what does it look like today?  

Ransomware dates to the 1980s and, although it has evolved in sophistication, the main goal for cybercriminals is still the same: financial gain. Ransomware is a form of malware where threat actors lock a computer, system, or personal files, and then demand a ransom payment to allow the users to gain access to their files. Cybercriminals will often threaten to delete these files or, in the case of bigger companies, publish sensitive information.  

Cybercriminals launch ransomware in several ways, including:  

Phishing links

It’s easy enough for cybercriminals to create convincing-looking fake messages with phishing emails. A popular method to launch ransomware involves using malicious links in phishing emails to take the user to a malicious site.

 

 

Links in attachments

A common phishing scam threat actors use involves including fake attachments in email. The phishing email directs the user to open an attachment to retrieve an invoice for example. The invoice itself includes a malicious link that leads to a phishing page that asks the user to enter the user’s credentials. 

Fake attachments

These scams typically use PDF, Word, or Excel attachments that claim to be important. When the user clicks on the attachment it opens a phishing web page. In other cases, clicking on the attachment automatically starts a ransomware download or the victim enables macros in the document that triggers a download. 

 

 

While some ransomware is easy for knowledgeable users to reverse, some forms of malware use advanced techniques such as cryptoviral extortion. This type of extortion encrypts a victim’s files and demands a ransom payment to decrypt the files and make them accessible again. When properly implemented by threat actors, recovering files from a cryptoviral extortion attack without the decryption key is a major problem. Today, cybercriminals request payment through cryptocurrencies or credit card payments. This helps cybercriminals maintain a level of anonymity. The blockchain in cryptocurrency uses hashes of public keys instead of individuals’ names to keep track of ownership. Blockchain is basically the name used for a cryptocurrency’s public ledger. The example below shows how the threat actor claims to have hacked a victim’s website. It’s evident this is coming from cybercriminals, what’s not evident is if their claims are true. Industry experts advise the public not to directly act on emails like this one. 

 

 

Bitcoin became popular when Cryptolocker appeared in 2013—and has since become a preferred payment method for ransomware operators. The FBI states that over $140 million has been paid to ransomware over the past six years using bitcoin wallets. This shows these campaigns are effective for cybercriminals. 

Some of the top recent ransomware email subject lines include:

  • Subject: H¡gh level of r¡sk. Your account has been hacked. Change yøur passwørd.
  • Subject: ***SPAM*** I GOT EVERYTHING!
  • Subject: RE: Take Notice Your Device Was Infected!!!
  • Subject: At Your Notice [email protected]
  • Subject: Mail delivery failed
  • Subject: Delivery Status Notification (Failure)

Email continues to be a vulnerability.  The fear of losing sensitive information or of making personal photos or videos public makes users vulnerable. To prevent email attacks, it helps to add multiple layers of protection to your email infrastructure. An email gateway designed for security can help reduce spam levels, catch phishing, and prevent malware, ransomware, and other email-borne threats.  

While an email security solution is essential, teaching users to be on guard against potential threats also makes a major difference. Make sure to hold regular security trainings with your customers to emphasize what to look for in a potentially malicious email.

If you’d like to learn more about how you can protect your email from ransomware and other email-borne threats, please contact us. 

 

Mia Thompson is product marketing manager, Mail Assure, at SolarWinds MSP.

 

Additional reading

How Do You Prevent Ransomware?
How Does Ransomware Spread?
Should Ransomware Recovery Fall Inside Your Security Contract?
You might also like...
Mail

Does your business (really) need an email continuity solution?

Mail

How to Detect and Prevent Business Email Compromise

Mail

Why Your Company Needs an Extra Archiving Solution for Outlook

Mail

Seven Tips on How to Identify Malware Threats in Business Email

Mail

How Email Archiving Can Help Move You Toward SOX Compliance

Mail

How a Secure Email Gateway (SEG) Can Protect Your Business

Want to stay up to date?

Get the latest MSP tips, tricks, and ideas sent to your inbox each week.

Loading form....

If the form does not load in a few seconds, it is probably because your browser is using Tracking Protection. This is either an Ad Blocker plug-in or your browser is in private mode. Please allow tracking on this page to request a subscription.

Note: Firefox users may see a shield icon to the left of the URL in the address bar. Click on this to disable tracking protection for this session/site

Recent Posts
  • DearCry Ransomware Review 
  • PSA vs ITSM vs ESM: Part 2—Which is the right fit for your MSP?
  • 4 ways PSA software helps MSP businesses
  • PSA vs ITSM vs ESM: Part 1—What do they do? 
  • Endpoint security for Mac: What you need to know In 2021
Categories:
  • Security (252)
  • Tips & Advice (130)
  • Backup & Disaster Recovery (97)
  • Best Practices (97)
  • Managed Services (89)
  • The Head Nerds (88)
  • Business Growth (79)
  • IT Support (43)
  • Business (42)
  • Automation (41)
  • Operations (38)
  • Cybersecurity (37)
  • Mail (37)
  • Remote Management (31)
  • ITSM (26)
  • Data (23)
  • Networking (22)
  • Cloud Computing (21)
  • PSA (16)
  • Marketing (15)
  • Product (11)
  • Service Desk (7)
  • Services & Support (5)
  • Mobile (4)
  • Risk Intelligence (4)
  • Customer Service (3)
  • GDPR (3)
  • Internet of Things (3)
  • Training (2)
  • Research & Trends (2)
  • LOGICcards (1)
  • Cybersecurity Awareness Month (1)
  • Business Risk (1)
Show moreless
N-able

Products
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able EDR
  • N-able MSP Manager
  • N-able Mail Assure
  • N-able Risk Intelligence
  • N-able Take Control
  • N-able Passportal
  • All Products Use Cases
Solutions
  • Security Solutions
  • Monitoring Solutions
  • Efficiency Solutions
  • Identify which RMM solution is right for me
  • Drive Efficiency with Automation
  • Manage my MSP Business More Efficiently
  • Manage my IT Department More Efficiently
  • Layered Security
  • Cross-Platform Support
  • Data-Driven Insights
About
  • About Us
  • Careers
  • Newsroom
  • Leadership Team
  • Upcoming Events
  • Subscription Preferences
  • COVID-19 Response
Support
  • N-able RMM
  • N-able N-central
  • N-able Backup
  • N-able Mail Assure
  • N-able Take Control
  • N-able MSP Manager
  • N-able Risk Intelligence
  • N-able Threat Monitor
  • N-able Passportal
  • N-able Take Control Downloads
  • Backup & Recovery Downloads
  • Service Status

Footer 2

  • Legal Documents
  • Privacy
  • California Privacy Rights
  • Security Information
  • Sitemap

© N-able Solutions ULC and N-able Technologies Ltd.
All rights reserved.