Ransomware Attacks The favorite of cybercriminals?

Ransomware Attacks The favorite of cybercriminals?

por: MAU ZUBIllaga

What is Rasomware?

Focused primarily on extortion, the ransomware It is a type of malware that uses different techniques that execute malicious code, convincing users that it comes from a secure source. In this way it is introduced into computers and mobile devices, which manages to prevent access to information, encrypting all the documents on the device and requesting a ransom to make it accessible again. After the initial infection, the malware will attempt to spread to the rest of the involved systems within the network, including shared storage drives, service interruption, which could cause financial loss upon restoration.

Kinds of attack

Some of the ways where the user can be infected by this type of malware are the following:

Social engineering: Cybercriminals manage to persuade victims to take actions to violate network security or gain access to them. Some situations usually arise when downloading programs without knowing if there is spyware or malware within the program. Its main sources are:

 

  1. E-mail The user is asked to download and execute an attached file. The contents of these emails usually include: some type of donation, collaborations with supposed “official” programs, notifications that we are waiting for package confirmation, sending documents or other types of messages to encourage downloading and execution.
  2. Social Networks: Through advertisements, if the user does not realize that it is from a true company and does not verify that the official website where it directs them is correct, they can be deceived and also spread through contacts or direct messages from friends on these platforms or Live where the aim is to persuade the user to download to obtain a prize.
  3. Downloads in websites It seeks to persuade the user through unofficial pirated software sites to direct them to infected websites and malvertising techniques where fake ads are embedded in legitimate websites.

Operating System Vulnerabilities: It is executed through an exploit (the key for them to access our system and then perform other malicious actions) to carry out a specific attack, run and remotely install malware to have control of the system.

Rise of Ransomware

Some of the popular ransomware are:

 

Lockdown Ransomware: This type of malware blocks the basic functions of the user's computer. It prevents access to your desktop, but you will still be able to interact with the criminal to pay the ransom, but it will be disabled.

 

Encryption Ransomware Its function is to encrypt your critical data (such as documents, photos or videos), but it does not affect the most basic functions of the computer. You can view the files, but not access them. They contain a countdown in their ransom demand; If you don't pay by the deadline, all your files will be deleted. Recommendation: Make several backup copies in the cloud as well as physical.

 

According to MakeUseOf, There are several probable scenarios. Ransomware targeting vehicles is an option, as researchers have already shown that it is possible to hijack and take full control of a moving vehicle. Smart home technology, such as security cameras, locks and thermostats, is also a resource exposed to infection, since these systems require a Wi-Fi connection to function and the security of several of them is insufficient against brute force attacks. There is also a risk of ransomware targeting the medical sector, which may target devices such as pacemakers, implants, and medical monitors. The growing Internet of Things (IoT) offers a wide variety of connection possibilities and its security standards are poor.(Kaspersky, s.f.)

bibliographic references

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Leave a Comment

Your email address will not be published. Required fields are marked *