Page 104 - Cyber Warnings August 2017
P. 104

ALL YOU NEED TO KNOW ON RANSOMWARE


               RANSOMWARE TRUE IDENTITY
               by Israel Gaudette, Owner, Best AV Software


               The  latest  spin  on  a  ransom  note  isn’t  composed  of  letters  clipped  out  of  a  newspaper.
               Increasingly, criminals are unleashing brash attacks on your PC and its data through a type of
               malicious  software  called  ransomware.  It’s  exasperating  enough  when  your  computer  is
               sluggish  because  of  a  virus,  but  what  if the  virus  installs  embarrassing pornography  on  your
               screen or encrypts your data so you can’t read it? Ransomware attacks often use these tactics
               to demand you pay a ransom to remove the pornography or to access your files.

               A well-known form of malware, ransomware ruthlessly holds a computer’s data for ransom via
               encryption. If the user doesn’t pay the cybercriminal a certain amount of money within a certain
               amount  of  time,  their  data  will  be  lost  forever.  It  is  a  malware  that  locks  your  keyboard  or
               computer to prevent you from accessing your data until you pay a ransom, usually demanded in
               Bitcoin. The digital extortion racket is not new—it’s been around since about 2005, but attackers
               have  greatly  improved  on  the  scheme  with  the  development  of  ransom  cryptware,  which
               encrypts  your  files  using  a  private  key  that  only  the  attacker  possesses,  instead  of  simply
               locking your keyboard or computer. Most recently, a global cyberattack spread ransomware to
               countless computers over 150 countries.

               Ransomware  is  as  scary  as  it  sounds.  Hackers  use  this  technique  to  lock  you  out  of  your
               devices and demand a ransom in return for access. Ransomware puts you in a sticky situation,
               so  it's  best  to  know  how  to  avoid  it.  At  its  heart,  ransomware  mimics  the  age  old  crime  of
               kidnapping: someone takes something you value, and in order to try to get it back, you have to
               pay up. For it to work, computers need to be infected with a virus, which is usually accomplished
               by tricking someone into clicking on a link. Imagine, for example, you're sitting at your computer
               and you receive an email that pretends to be from a well-known organization, like FedEx. The
               email says FedEx just tried to deliver a package, the delivery guy is still in the area, and if you
               click on the link, he will attempt to deliver it again in the next couple hours.

               Many  more  strains  are  expected.  This  is  only  the  early  days,  and  as  we  said,  it’s  a  very
               successful criminal business model with many copycats. New strains regularly get spotted in the
               wild,  cybercrime  is  furiously  innovating  in  both  the  technical  and  social  engineering  areas.
               Cybercriminals didn't use to be so obvious. If hackers infiltrated your corporate network, they
               would do everything possible to avoid detection. It was in their best interests not to alert a victim
               that they'd fallen victim to a cybercriminal.

               Ransomware is typically installed in a system through a malicious email attachment, an infected
               software download and/or visiting a malicious website or link. When the system is infected with
               ransomware,  it  is  locked  down,  the  user's  files  are  encrypted,  or  the  user  is  restricted  from
               accessing the computer’s key features. The ransomware will send pop-up windows asking the

                  104    Cyber Warnings E-Magazine – August 2017 Edition
                         Copyright © Cyber Defense Magazine,  All rights reserved worldwide.
   99   100   101   102   103   104   105   106   107   108   109