ransomware: on the rise
TRANSCRIPT
Ransomware has been a growing trend for the past two years,
and this is just a culmination, a grand reveal to the wider world of
just how big of a threat it is. But we’ve been writing about this for a while now.
For More Visit Https://WWW.ThesisScientist.com
There are 2 Types of Ransomware in
Circulation:
1. Encryptors, which incorporates advanced encryption
algorithms. It’s designed to block system files and demand payment
to provide the victim with the key that can decrypt the blocked
content
For More Visit Https://WWW.ThesisScientist.com
2. Some locker versions infect the Master Boot Record (MBR). The MBR is
the section of a PC’s hard drive which enables the operating system to boot
up. When MBR ransomware strikes, the boot process can’t complete as usual
and prompts a ransom note to be displayed on the screen.
Examples include Satana and Petya
Why Ransomware creators and distributors target businesses:
For More Visit Https://WWW.ThesisScientist.com
• Because that’s where the money is;
• Because attackers know that a successful infection can
cause major business disruptions, which will increase
their chances of getting paid;
• Because computer systems in companies are often
complex and prone to vulnerabilities that can be exploited
through technical means;
For More Visit Https://WWW.ThesisScientist.com
• Because the human factor is still a huge liability which canalso be exploited, but through social engineering tactics;
• Because ransomware can affect not only computers butalso servers and cloud-based file-sharing systems, goingdeep into a business’s core;
• Because cyber criminals know that business would rathernot report an infection for fear or legal consequences andbrand damage.
Most Common infection methods used by Cybercriminals
• Spam email campaigns that contain malicious links or
attachments (there are plenty of forms that malware can use
for disguise on the web);
• Security exploits in vulnerable software;
• Internet traffic redirects to malicious websites;
• Legitimate websites that have malicious codeinjected in their
web pages;
• Drive-by downloads
• Malvertising campaigns;
• SMS messages (when targeting mobile devices);
• Botnets;
• Self-propagation (spreading from one infected computer to
another); WannaCry, for instance, used an exploit kit that
scanned a user’s PC, looking for a certain vulnerability, and
then launched a ransomware attack that targeted it.
• Affiliate schemes in ransomware-as-a-service. Basically, the
developer behind the ransomware earns a cut of the profits
each time a user pays the ransom