An In-Depth Look at Ransomware

The hour-long webinar is a detailed discussion about the ransomware, its implications and methods of protecting yourself, and clients from possible attacks. Gillware begins by defining a ransomware as type of malware designed for extorting money from innocent people. The two popular types are the crypto and the screen locker. However, there are several types of ransomware. The crypto encrypts all the important files in the computer and gives the user a given amount of time to pay the ransom to get the decryption key. If the user fails, then the files will remain encrypted. Ciampa (2015) asserts that most of these criminals demand a ransom that can be paid easily, averagely $300. Conversely, the locker is another type of malware that restricts access to the device until the ransom is paid. The ransomware has become rampant in the recent years due to improved technology, better distribution strategies, and simpler monetization. Ramachandran (2011) holds the same notion that the presence of internet banking & credit cards and reduction in the use of cash make it easier to transfer payments to criminals, which in this case is referred to as simpler monetization.

 

The modern computers and servers register high performance, which create stringer encryptions that are difficult to manoeuvre. Organizations that encourage Bring Your Own Device (BYOD) and users that use the Tor Browser are the most vulnerable. Almgren, Gulisano & Maggi (2015) assert that ignorant users click on links in emails unknowingly. The mails usually have the malware embedded in them, which infiltrate the computer. The malware spreads to the entire company network including the devices attached to the network when the computer is connected to the organization’s network. The ransomware infiltrates the network and encrypts important looking file extensions, for instance, doc(x), xls(x), jpg, and pdf. The malware encrypts all the contents but does not rename the extensions. Gill has developed a cloud that assists people registered on it to retrieve the information when they are attacked. The files are duplicated in the form of revisions to allow easy retrieval. Furthermore, he recommends a client to use strong automated backups to minimize attacks. Additionally, the users should ensure that the backup is in a position to keep revision history. Companies should use anti-malware to protect their businesses. In addition, the IT administrators should develop ways of monitoring massive amount of changed files within a given time frame using various end-user’s analytic solutions that are available in market.

 

Gills webinar is important to business organizations. Firms are vulnerable because they can lose valuable company/or customer data to the hacker. Moreover, an organization can lose important company secrets, which competitors can use to drive them out of business. Therefore, enterprises can adopt cloud-based storage to reduce possible losses of their data and enhance recovery in case of loss.

 

References

Almgren, M., Gulisano, V., & Maggi, F. (2015). Detection of Intrusions and Malware, and Vulnerability Assessment. 12th International Conference, DIMVA 2015, Milan, Italy, July 9-10, 2015, Proceedings. Springer.

Ciampa, M. (2015). Security+ Guide to Network Security. Boston Mass: Cengage Learning.

Moryn, J. (2016, May 10). An In-Depth Look at Ransomware . Retrieved from Gillware Blog: https://www.gillware.com/data-recovery/an-in-depth-look-at-ransomware

Ramachandran, V. (2011). BackTrack 5 Wireless Penetration Testing Beginner’s Guide: Master bleeding edge wireless testing techniques with BackTrack 5. Birmingham UK: Packt Publishing.

 

 

1 comment

  1. I see interesting posts here. Your blog can go viral easily, you need some initial traffic only, you should read about Bushano’s traffic sources

Leave a Reply

Your email address will not be published. Required fields are marked *