What is Ransomware?
Imagine logging onto your laptop one fine morning, checking mails and clicking on a few links and being confronted with this dialog:
This is an example of “ransomware”which unsuspectingly will lock the contents of your computer and keep it out of your own reach. You will be given access to your files only after a ransom is paid! Ransomware is a type of malware that is attacking computers worldwide. TrendMicro, USA defines ransomware as “a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the users’ files unless a ransom is paid”.
How does it work?
Ransomware malware starts its nefarious activity as soon as an innocent user clicks on a malicious link or downloads an equally malicious attachment. Once the malware has downloaded, it encrypts the contents of the intended recipients files(or locks the screen) and only once a ransom is paid, the files are promised to be decrypted(which may or may not happen) The payment is expected to be done only in the form of bitcoins or any other type of virtual currency which cannot be easily tracked. CryptoLocker, CryptoWall, CTB-Locker, Locky, TeslaCrypt,TorrenLocker are some of the different types of ransomware.
Targets of ransomware:
Personal home users, small businesses, large organizations are all equally targeted by rogue ransomware malware. The more oblivious you are to the security conundrum the more vulnerable you are to these types of attacks. Let us see how these type of users will fall victim to ransomware attacks:
Examples of recent Ransomware attacks:
These are some of the recent ransomware attacks:
How do we protect against these attacks:
In today’s digitized world, it is but obvious that we will be subjected to different types of security attacks each day. The key is to stay updated and stay on top of the hacker’s intents no matter what your profession may be.
Jayanthi Manikandan has an undergraduate degree in Computer Science from India and a Master’s degree in Information systems with a specialization in Information security from Detroit, MI, USA.
She has been passionate about Information security and has several years of experience writing on various technical topics. Additionally, she loves to pen a few personal thoughts here as well! 🙂