These articles are for general information purposes only and are not intended to provide legal, tax, accounting or financial advice. PNC urges its customers to do independent research and to consult with security, financial and legal professionals before making any financial decisions. This site may provide reference to internet sites as a convenience to our readers. While PNC endeavors to provide resources that are reputable and safe, we cannot be held responsible for the information, products or services obtained on such sites and will not be liable for any damages arising from your access to such sites. The content, accuracy, opinions expressed and links provided by these resources are not investigated, verified, monitored or endorsed by PNC.
What Is Cryptocurrency, & How Risky Is Investing in It
Many People Have Heard of It but Don’t Really Know How It Works
The crypto craze is an investment trend that’s grown in popularity the last decade. Many people seem to think it’s a quick way to get rich, but the Federal Trade Commission (FTC) found cryptocurrency accounted for the second highest scam losses in 2021.
Take Precautions
The best defense is prevention. The tips below, while not all-inclusive, can help protect your business and personal devices from attack:
- Install the Russian keyboard option in your Windows system – Some Russian malware gangs program their malware to check for the presence of Russian (or other Cyrillic) keyboards on the system. If they find it, they may not attack that system. While not a guarantee, this is a simple step you can take, for free, that will not impede your use of your system in any way:
- Hit the Windows button and “X” at the same time
- Select “Settings” then “Time and Language” then “Language”
- Scroll to the Russian or other Cyrillic option.
- Pick one, then reboot.
- Hit the Windows button and “X” at the same time
- Maintain offline, encrypted backups of data, including system images and configurations. Test your backup data and files regularly — after all, there’s no need to pay ransom for data that’s accessible via backup.
- Install software updates and patches as soon as possible.
- Ensure that antivirus and anti-malware software is set to automatically scan and update.
- Establish basic security practices and policies for employees, including strong passwords and multifactor authentication.
- Educate employees on social engineering and phishing, including how to spot red flags and report suspicious activity.
- Restrict internet access. Use a proxy server for Internet access, and implement ad-blocking software. Restrict access to common ransomware entry points, such as social networking websites.
- Use a secure email gateway/system to detect and block malicious emails, flagging external emails to alert employees of potential spoofing.
- Block all unauthorized software from executing on all devices and servers.
- Conduct regular vulnerability scanning and perform penetration testing to find and patch vulnerabilities.
- Apply a policy of “least privilege” to all systems and services; users can only access required platforms.
- Monitor your server, network and backup systems to detect unusual file access activities and network activity.
- Implement Domain-based Message Authentication, Reporting and Conformance (DMARC) policy and verification to lower risk of spoofed or modified emails from valid domains.
Methods of Attack
Attackers have many methods of delivering malware, including:
- Phishing emails:
An email recipient opens a malicious attachment or clicks on a compromised link. - Drive-by download:
A compromised website downloads malware onto your device without your knowledge. - Strategic attacks: These attacks target software vulnerabilities.
- Remote desktop protocol compromise: A user logs on to a computer remotely, and hackers use brute force methods and credentials which they purchased on the dark web.
Responding to an Attack
If you ever experience a ransomware attack, don’t panic, take these steps:
- Disconnect the infected system from the network to contain the spread.
- Determine if a decryption key may be available; other organizations may have investigated similar malware.
- Restore files from regularly maintained backups.
- Notify your financial institution, customers and third parties that might have been affected by the attack.
- Contact a cybersecurity expert or consulting firm
- Reporting the attack! Contact a local Federal Bureau of Investigation (FBI) Field Office and/or file a complaint the FBI’s Internet Crime Complaint Center.