Smartphones and computers are becoming increasingly important in our lives. Changing how we chat, talk, work, study, read, shop and move around. What happens when we can’t use our devices or access all the data that supports a modern life? How much would we pay to get it all back?
Cyber-criminals, armed with ransomware, are finding the answers to exactly these questions.
In broad terms, ransomware is a category of malicious software designed to block access to a computer system. Until you pay a sum of money.
Three different types of ransomware are out there so far. The “mildest” of all ransomware are screen-lockers. They only prevent the user from accessing their device by blocking access to the desktop or home screen. (In the case of smartphones). While annoying, screen lockers can be bypassed without paying the attacker. Provided you have enough technical experience to get your hands dirty.
Because of this, non-encrypting ransomware proved ineffective at making money and was overshadowed by crypto-ransomware. Crypto-ransomware is extremely effective as it encrypts specific locally stored information – and sometimes cloud backups, too. And offers to decrypt it in exchange for a fee ranging from $300 to $900. Because crypto-ransomware uses the same technology that protects our conversations, banking transactions and military communication. Encrypted files can’t be retrieved without paying the ransom. Crypto-ransomware families are responsible for extorting more than one billion dollars a year from victims.
This year we saw the emergence of a third category of ransomware, namely disk-encryptors such as Petya. Unlike file encryptors, disk encryptors hold the entire disk drive at ransom. And prevent the user form booting their operating system.
Most of the times, ransomware spreads by posing as invoices, delivery notes and attached CVs. Or other enticing content attached to carefully crafted spam e-mails. If the user opens the message and clicks the attachment, the encryption process starts. When all the information is encrypted, the user sees a warning message directly on the desktop. Along with instructions on how to pay the ransom and get the decryption key.
Other times, ransomware operators buy advertising on high-traffic websites. These adverts are not your regular banners, but rather crafted ads that exploit vulnerabilities in browsers and browser plugins. When the browser (or the respective plugin) crashes, it automatically installs the ransomware component. This approach allows the ransomware operators to infect victims even if they are following best practices in handling junk email.
Last but not least. Ransomware operators sneak their creations into illegal, pirated content that is available for download on torrent or “warez” websites.
Ransomware is a complex threat that relies on multiple attack vectors to infect users. Defeating ransomware attacks is difficult, but not impossible. Authorities have joined forces internationally to come up with the best strategies to prevent these scams. But, in the meantime, here are a couple of tips to make sure you don’t lose your data or money.
Run a security solution that can detect emerging ransomware. Keep your security solution up to date and active at all times. If you don’t have a security solution in place, try Bitdefender’s award-winning Internet Security or Total Security products.
Take regular backups of your important files. And store these backups on storage devices that are not permanently connected to your computer. If you fall victim to ransomware, you should restore your files from backup. Rather than pay for the decryption key. This way, you render the ransomware business unprofitable. And just like any unprofitable business, it will fade out by itself. Just by staying safe and not paying the money you can do your part to take ransomware down.
Want to learn more about ransomware? Its history, how it works and how it brings fortunes to cyber-crooks? You might want to check this article out.
Contact us now to book a short meeting. Call 0861 211 212 / 087 809 3516 or complete the form below. We can assist you with all your IT needs.