{"id":183,"date":"2018-12-01T10:30:00","date_gmt":"2018-12-01T05:00:00","guid":{"rendered":"https:\/\/www.tikaj.com\/?p=183"},"modified":"2022-12-13T16:44:52","modified_gmt":"2022-12-13T11:14:52","slug":"ransomware","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/ransomware\/","title":{"rendered":"What is Ransomware?"},"content":{"rendered":"\n

Ransomware is a type of malicious software or Malware. In other words, we can say it is a subset of Malware, it prevents users from accessing their system or personal files and demands a ransom payment to regain access. It spreads through Emails or by unknowingly visiting an infected website. <\/p>\n\n\n\n

It can be affected to an individual or an organization. In 2017 alone, ransomware alone was responsible for $5 Billion loss<\/a>, both in terms of ransoms paid and spending and lost time in recovering from attacks.<\/p>\n\n\n\n\n\n

Different Types of Ransomware<\/h2>\n\n\n
\n
\n\n<\/div>\n\n
\n
\n

Scareware<\/h3>\n

Scareware includes rogue security software and tech support scams. Users may receive pop-up notifications claiming that malware has been detected on their system and the only way to get rid of it is to pay up.<\/p>\n<\/div>\n<\/div>\n

\n

Screen lockers<\/h3>\n

Screen lockers, or lockers, are a type of ransomware<\/a>. When it gets into the victim’s computer, the victim’s is completely out of the computer. Upon starting up the computer a full-size window will appear, which looks like an official government seal saying that illegal activity has been detected on your computer and you must pay a fine.<\/p>\n<\/div>\n<\/div>\n

\n

Encrypting ransomware<\/h3>\n

In encrypting ransomware, the attacker will gain access to the user system, encrypt the data of the user and ask for a payment to unlock the files. More information about the encryption method is elaborated in this blog<\/a> by Infosec Institute.<\/p>\n

Biggest cyber attack detected in last decade was a ransomware attack knows as Wannacry Ransomware Attack<\/a>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n\n\n\n

How it works? <\/h2>\n\n\n\n

There are a number of ways ransomware can take to access a computer :<\/p>\n\n\n\n

    \n
  1. One of the most common ways is to send the phishing spam-attachments to the victim’s Email and it looks like that the sender of the Email is trusted.<\/li>\n\n\n\n
  2. When the file is downloaded and opened, the attacker can take control over the victim\u2019s computer. If they have built-in social engineering tools that trick users into allowing administrative access.<\/li>\n\n\n\n
  3. Once it\u2019s taken over the victim\u2019s computer, the most common action is to encrypt some of the victim\u2019s computer files, with a surety that at the end of the process, the files can\u2019t be decrypted without a mathematical key known only by the attacker.<\/li>\n<\/ol>\n\n\n\n

    Precautions<\/h2>\n\n\n\n

    Following are precautions you can take<\/p>\n\n\n\n

      \n
    • Systems should be updated with the latest update, as outdated software and operating systems are the targets of most attacks.<\/li>\n\n\n\n
    • Any one should never click on links or open attachments in unsolicited Emails.<\/li>\n\n\n\n
    • Backup data on a regular basis. Keep it on a separate device and store it offline.<\/li>\n\n\n\n
    • Follow safe practices when browsing the Internet.<\/li>\n\n\n\n
    • Enable strong spam filters to prevent phishing emails from reaching the end users and authenticate inbound email to prevent email spoofing.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"

      Ransomware is a type of malicious software or Malware. In other words, we can say it is a subset of Malware, it […]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"rank_math_lock_modified_date":false,"footnotes":""},"categories":[13],"tags":[],"class_list":["post-183","post","type-post","status-publish","format-standard","hentry","category-uncategorized-en"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/183","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=183"}],"version-history":[{"count":4,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/183\/revisions"}],"predecessor-version":[{"id":5616,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/183\/revisions\/5616"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=183"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=183"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=183"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}