Skip to main content

Ransomware Attacks

What is a ransomware attack?

It is an attack by a hacker or a group of hackers who remotely locks the target computers and demands money in order to restore the data and access.


How does it work?

When a computer is infected, the ransomware program(malware) encrypts important documents and files and then demands a ransom, typically in Bitcoin, for some kind of Digital Key in order to unlock the files. Though there is not surety of computer being unlocked so just in case the user didn't have any recent backup of his data he/she might face a huge data loss.

Recent Ransomware Attacks:-

1.  WannaCry Ransomware:-

This attack began on 12 may 2017 which targeted computers running Microsoft Windows Operating Systems by encrypting their data and demanding some ransom in Bitcoin so as to unlock the computer.

Within a day this attack was reported to have infected more than 230,000 computers in over 150 countries. Parts of the United Kingdom's National Health Service (NHS), FedEx and Deutsche Bahn were hit, along with many other countries and companies worldwide.

Some computer being infected by WannaCry




2. Petya Ransomware:-

Petya is a family of encrypting ransomware that was first discovered in 2016.
On 27 june 2017 this ransomware started infecting computers worldwide. The malware targets Microsoft Windows - based systems, infecting the Master Boot Record (MBR) to execute a payload that encrypts a hard drive's file system table and prevents Windows from booting. It subsequently demands that the user make a payment in Bitcoin in order to regain access to the system.

This attack came just a month after the WannaCry attack and according to various software companies like Kaspersky, this attack infected more computers than the previous attack.

Some computer infected by Petya Ransomware



Tips to follow to protect against Ransomware Attacks:-



1. Think before you click- If you receive an email that contains an attachment, think twice before clicking on it. If you were not expecting it or it looks suspicious, delete it, even if it appears to come from someone you know.


2. Back up your files- Always make sure your files are backed up. That way, if they become compromised in a ransomware attack, you can wipe your disk drive clean and restore your data from the backup. Remember, backups can also get infected, so you should disconnect your backup drives from your PC when possible to prevent this from happening.


3. Update your PC and devices- Ensure that your PC's operating system is up-to-date to latest Windows 10. Software updates and 'patches' contains security improvements that help to secure your PC and make it more difficult for ransomware and viruses to infect it.


4. Update your security software- New viruses and threats appear all the time, so it is important to keep your security software up-to-date.


5. Avoid using public internet connections and cracked softwares.

Read more about the topic at:- 






Comments

Popular posts from this blog

Darknet and TOR (Part-II)

As I explained in the previous post, dark web is a deep ocean of webpages and resources containing all sorts of information and stuff. You can nearly find anything and everything there, but sometimes people come across stuff they shouldn't be seeing or using and that's what makes it imperative to use the dark web in a safe manner so that you don't harm yourself and your computer network. As I already explained that dark web is a place of resources but along with that you have to be very careful while using it and one should definitely follow some of the recommended security measures so as to ensure data safety and integrity. Normally people are way too careless while using the darkweb and don't keep in mind certain things that they are not supposed to do and end up compromising their computers. One has to keep in mind that along with normal and good people there are always hackers and hacker groups sitting on darkweb trying to exploit any vulnerable machine they ca

What is a VPN? Why you should use one? What are the best VPN options out there?

What is a VPN? A Virtual Private Network (VPN) allows the user to extend a private network over a public network thus allowing the users to send and receive data securely even on unsecured public connections. VPN basically creates a tunnel between the user and the internet through which all the data is sent and received, thereby encrypting the data. Why you should start using one? It secures your computer’s internet connection to guarantee that all of the data you are sending and receiving is encrypted and secured from prying eyes.       2. It gives the user complete privacy by hiding their real IP address.      3. Some VPN services also provide DNS leakage protection which is actually one very good security feature to go for.     4. It helps the user to  bypass Regional Restrictions on data, for example the user can watch netflix content of some other nation or he/she can open a website which he/she earlier was unable to.    5. It keeps the use