Australian based Managed IT support offices in Melbourne, Sydney and Brisbane
Powernet Colour a VITG Company POS

What You Need to Know About Toll's Recent Cyber Attack

In a statement posted on Tuesday afternoon, Toll said that it was shutting down some of their IT systems on Monday after they detected unusual activity on one of their servers.

Toll confirmed that there was a cyberattack on their systems, in the form of a relatively new form of ransomware known as Nefilim.

This is the second ransomware attack Toll has experienced this year. They confirmed that the two incidents look to be unrelated.

They are yet to state how the ransomware infiltrated their systems however, it doesn’t look like their data has been compromised at this stage.

It is a common misconception that small businesses and individuals are safe and unlikely to be victims of cyberattacks like the ones Toll has experienced. Small businesses are often an attractive target because of this misconception. They believe that cybersecurity isn’t an investment they should make, and cybercriminals know this and use it to their advantage.

What is Ransomware?

Ransomware is a form of malware that works to encrypt a victim’s files. The attacker then demands a ransom in order to unlock and restore access to the files. Files can anything from Word documents to software database files, loosing access to both could be detrimental to a businesses operation.

We have seen ransoms requested for a few hundred to hundreds of thousands of dollars. Generally, the cyber criminals performing these attacks are ‘reputable’ and will provide you with an unlock key to gain access to your files again. However, there is no guarantee, even if you pay the ransom.

How do you get Ransomware?

There are many ways Ransomware can infiltrate a computer or server, but the most common method is through phishing emails.

‘Phishing emails’ are emails posing to be from someone, or from somewhere that they are not. They will request you to download a file, either from within the email itself or from an external link. A program will be downloaded to your computer and will work quickly to lock down your files. A lot of the time you won’t even notice it running, and by the time you notice files being locked, it’s too late!

How can I protect myself?

Education and proactive prevention are key! Ransomware commonly enters a business through malicious emails so, having an email filtering and ‘containerisation’ platform in place is step one.

Having a live backup that is separate to your day to day business operating systems is key. Being separate means that if your files do become compromised, the ransomware can’t travel to the backup system as well, and you can restore operating systems with relatively little interruption.

No system can provide 100% protection, so your next step of defense is education. Teaching you and your team how to identify phishing emails and malicious activity. Phishing emails can look legitimate and be really tricky to spot, particularly if they are targeted at an individual person. We recently published a training video on how to identify phishing emails, watch it here.

The True Cost of Ransomware

When setting up and reviewing your cybersecurity, it is important to think about what a cyberattack like this one would cost your business, besides the ransom itself. The damage to your reputation, productivity, and service delivery. We published an article on what the average cost of a ransomware cyberattack is, you can read more about it here.

We are an IT Managed Service Provider who specialises in Cybersecurity. We would love to help you understand how you can better protect yourself and your business!

Subscribe to our newsletter for the latest technology tips & tricks.

Recent Articles

Tags

Categories

Search the Powernet blog

Getting the most out of Microsoft Teams, our top 10 tips

Getting the most out of Microsoft Teams, our top 10 tips

What is Microsoft Teams? Microsoft Teams is a valuable workplace tool, keeping employees connected and organised. It drives productivity and […]

Read more
Empowering Efficiency: The Rise of Business Process Automation

Empowering Efficiency: The Rise of Business Process Automation

Staying ahead of the technological curve in today’s fast paced landscape is essential. The concept of engaging a vCIO has […]

Read more
The Australian Cybersecurity Centre and the FBI's Joint Advisory #stopransomware

The Australian Cybersecurity Centre and the FBI's Joint Advisory #stopransomware

Who Are Play Ransomware? Play is a group of hackers that are responsible for extortion and ransomware attacks on government […]

Read more

We are well awarded

Reach our team

We’re always happy to help you find the right solutions to your IT and technology needs. Here are some ways to contact us.

Give us a call

Chat with our team to discover the best IT solutions for your organisation.
1300 892 692

Our locations

Melbourne CBD

Level 15 / 565 Bourke Street, Melbourne VIC 3000

Eastern Melbourne

Level 2 / 74 Doncaster Road, Balwyn North VIC 3104

Geelong Region

East 4/13-35 Mackey Street, North Geelong VIC 3215

Sydney

U18 / 23-31 Bowden Street,
Alexandria NSW 2015
(02) 8214 8855

Brisbane

Unit 1 - Building 6 / 2404 Logan Rd, Eight Mile Plains QLD 4133 (07) 3137 1313

Brisbane

7/9 Archimedes Place,
Murarrie QLD 4172

Send us an enquiry

cross