Skip to main content

Ransomware - Trojan in Disguise

 




You log into the computer, and it boots up. But instead of seeing the welcome screen, you get a dialog box. 


"Your data has been encrypted. To recover, pay $$ of Bitcoin."


The message also has a countdown timer, which indicates a payment deadline. 

Passwords, credit card details, personal videos/pictures all have been compromised. The hacker even threatens to leak everything online.


What happened......


Ransomware is a type of malware that encrypts personal data and blocks access to a computer/network.

To regain control, a ransom needs to be paid. Usually this is through Bitcoin, or other crypto currencies.

On payment, a key is given, which decrypts everything, and returns access to the system. 

However, you could be placed in a "Sucker's list" which is sold in the dark web. This can attract more ransomware attacks, in future.


History....


Originating in the 90s, the attacks were first recorded in Russia. Since then, it has crossed into Europe and North America. The hackers also transitioned from a lone wolf setup to organized crime cartels.


Modus Operandi


The attack transpires in five different stages


1. Redirected to a malicious website via adware, or email attachments. The virus gains access when a link is clicked, or a trojan software installed. Infected USB drives, or external hard disc is another mode of entry.


2. Once inside, the malware tunnels deep into the operating system. Here the payload is detonated.


3. The virus attacks as many files as possible. It also downloads other malwares, to facilitate its progress.


4. Targets the Master Boot Record present in primary storage device. This is a piece of software that loads the Operating System. It gets overwritten by malicious code. 


5. To get full control, a restart is prompted. Once done, the malware has complete control of the system.


Prevention


1. Ransomware targets weak system points, known as Zero Day Exploits. Regularly update the operating system. 


2. When visiting websites, refrain from clicking unknown links. Type the site address manually. This reduces getting directed to malicious ones.


3. On connecting any USB drives or external hard disc, pass it through a USB Key Sanitizer. This removes any malicious files, present in the same.


4. Invest in an antivirus software, preferably a paid one. This guarantees better service and regular updates.




Additional Information

https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/



Comments

Popular posts from this blog

Clock Speed - Benchmark for Processors?

Intel i7 - Base Frequency 2.80 GHz, 4.70 GHz (Turbo Frequency) Intel i9 - Base Frequency 2.2 GHz, 5.8 GHz (Turbo Frequency)  AMD Ryzen 7 - Base Frequency 3.4 GHz, 4.6 GHz (Max Boost Clock) Whenever we shop for a laptop or home PC, we note the processor speed. The saying being more the clock speed, higher the performance . However, efficiency of a chip is determined by a range of other factors What is clock speed? The CPU (Central Processing Unit), or processor performs various arithmetic operations, at any given time. This is performed by opening and closing billions of transistors, embedded within it. That constitutes a cycle.  Simply put, clock speed is the number of cycles executed per second ,  calculated in GHz.  So, a processor having 3 GHz speed, performs 3 billion cycles per second. Higher this ratio, better the performance. At least, in paper. But there are other things in play, when looking at the overall functionality.   Multi Core processing A sing...

Malware - The Nemesis in Disguise

  The era of computer age brought a major shift in technology and redefined the way we work, communicate, and entertain ourselves. From OTT platforms to financial transactions, the bits and data move seamlessly through optical fiber cables (OFC), at lighting speed. But, on a parallel path, malware attack has ushered in a wave of cyber-crimes, ranging from identity theft to data hacking. What is Malware... Defined as any software which intentionally disrupts the working of a computer or network system .   This can be in the form of data loss, denial of service (DDoS) attack, or hijack of core computer services.  These attacks are not confined to business or home users, but extend to large industries such as water treatment, or electric substations.   Malwares are classified into different categories. This is based on their attack signature, proliferation and of course, main intent or purpose . Types of malwares 1. Virus The most reputed, virus enter host computer...