Ransomware
– A growing Menace
Ransomeware is a very common term that we come across
these days. Ransomware is a type of malware that encrypts your files or locks
up your desktop. It might also restrict your access to computer or disable
input devices. It can take a picture of you through the webcam and blackmail
you to pay huge money to keep your files secure. This type of malware forces its victim to pay
a ransom to the attacker in order to get back access to their system. There are
some forms of ransomware that systematically encrypt files on the system’s hard
drive and the use of these has grown internationally. Ransomware usually
propagates as a Trojan which is disguised as a legitimate file.
Different
Types of Ransomware
There are different types of ransomware. It depends on
how severely they affect your computer. Some kinds of ransoware simply block
users from accessing the system by locking their screen. Another kind of
ransomware terminates the applications from working. The most common type of
ransomware, encrypts users personal files such as their documents and pictures,
preventing the access to these, until a ransom is paid in exchange for the
decryption. This type of ransomware is famous with the name of Cryptolocker.
How
Ransomware gets onto your System
One way ransomware can arrive on your computer is through
opening attachments in spam emails. These attachments may look normal mails but
when you open them your computer will get infected with malware. Another way
through which ransomware can target your computer is by opening certain
infected websites. These can be fake websites set up by the hackers themselves
or legitimate websites that have been compromised in order to spread malware.The
content of these emails and websites usually claims that the user has won a
prize, free download, movie unlimited and so on. The user often gets tempted by
these attractive offers and clicks on the provided links and easily downloads a
malware on their system.
Ransomware
– Target for Mobile Devices
Ransomware is becoming very common in mobile devices
these days. There are plenty of threats that can lock your smartphone or tablet
and can even encrypt files stored on these devices, blackmailing you to pay a
huge ransom. In order to protect your
phone from being targeted, avoid downloading apps from unfamiliar sites and
install only from trusted sources. You are also advised to install a security
app, in order to protect your device and data.
How
is it beneficial for the hacker?
Attackers force the user to pay a ransom if the victim
wants to recover the infected files from his computer. There is no fixed amount for the ransom. It
can go from a few dollars to hundreds of dollars. Attackers look for
untraceable methods to be paid. Recently, bitcoin is being used as a ransom
currency, as it happened with CTB Locker, which demanded 8 bitcoins in exchange
for the decryption key to recover the files that were encrypted. It is also
important to note, that in many cases paying the ransom does not guarantee the
recovery of files or the access to the system.
How
to stay safe from Ransomware?
Make sure you do not open files that are downloaded from
untrusted sites. Keep updating your system on a regular basis. Make sure you
have an antivirus installed on your PC and you keep it up to date. It is also very important to verify the email
address and take extra caution when opening emails containing attachments or
links. Even if the mail is send by a person you know make sure to check it and
take some immediate action.
Another important thing that you need to take care of is
when you are using a USB drive in your computer, remember to perform a virus
scan.
It is also recommended to make backups of your system,
important files and folders in order to minimize the loss in case of a virus
attack or system crash.
Conclusion
Thus, we can end up by saying that ransomware is a very
common malware which can block the access to your computer or files. Backing up
of your files and folders can help to minimise the impact in case of an attack.
Being cautious while opening email attachments from untrusted sources and
having an updated antivirus software can help you prevent from becoming a targeted
victim.