Currently there are many Ransomware (Malicious software extortion) appear to pose a threat to the security of user data, and most recently Petya Ransomware is the latest malware discovered by security experts, Petya Ransomware works the same with WannayCry It’s invading the device and taking ownership of your critical data, and of course, getting back you will have to pay a certain amount based on the number of documents and its importance.
How dangerous is ransomware or malicious ransom?
Ransomware Malware is a type of malware that encrypts multimedia files, documents, and other files on the destination computer and the user only has access to these files when accepting the “ransom” of the attacker.
Present, There are 2 types of ransomware – one type locks certain files on the computer and the second locks the entire system. The second type is mainly found on smartphones.
Ransomware has been around for more than a decade. The first cases of ransomware attack were found in Russia in 2005 with the Trojan GPcoder.
Ransomware virus first known to create trouble on a large scale and developed by organized Russian criminals in 2005 and 2006.
Computers in countries infected with this type of malware (malware) include Russia, Belarus, Ukraine and Kazakhstan. One of these types of malware is called Archievus and another is called Troj_Cryzip.A.
Although the old version was encrypted in the My Documents folder, the software identified and moved certain types of files in the computer to a password-protected Zip folder, the victim could only Open these files if the ransom is transferred to the attacker through money E-Gold.
E-Gold was discontinued in 2009 at the behest of the US government due to the large number of criminals using it to launder money. Bitcoin and prepaid debit cards were then used as a ransom collection method.
Near the end of the first decade, many ransomware attacks emerged suddenly, impersonating law enforcement. These attackers harass victims with fake allegations such as copyright infringement and “fine” for these non-existent charges.
The most notorious case of those who enforce this law is Reveton. Depending on the country where the victim lives, Reveton will impersonate national police.
Developers have put a “limited” effort to most of Europe, the US, Australia, Canada and New Zealand. Ransomware did not use encryption to block user files, removing ransomware easier with an antivirus program or through safe mode.
In 2012, ransomware targeted the Windows Master Boot Record (MBR) and replaced it with a malicious code. When booting the system infected with this malicious code, users will receive instructions to pay a huge amount of money through QIWI – a Russian payment system – to gain access to their devices.
One of today’s ransomware attack methods was first found in 2012-13. CryptoLocker is the first malware program to successfully win a $ 27 million ransom.
CryptoLocker is encrypted using AES 256-bit and RSA 2048-bit, making the encryption virtually unbreakable even after removing malware – one of the most effective ways of attacking the attacker.
Victims of this attack are required to pay $ 400 or more to receive the decryption key and are threatened with deletion of the decryption key if the attacker doesn’t receive the ransom within 72 hours.
In 2014, CryptoLocker was taken down by an alliance of government agencies, security firms and Operation Tovar research institutes. Victims are also provided with a free service to decrypt devices that are victims of CryptoLocker.
Although the CryptoLocker threat does not last long, it certainly helps an attacker to explore the ransomware world and determine how profitable it is – and as a result some other ransomware are “born.” ”.
CryptoLocker is made by TorrentLocker, a ransomware program that appears as an email attachment – usually a file with malicious macros – that locks specific types of files on your computer with AES code.
TorrentLocker is still active and has evolved over the past few years. The newer TorrentLocker versions rename all infected files on the computer, making it impossible for users to determine which files have been encrypted and restore files through backup.
Ransomware not only attacks Windows computers, but also Linux and Mac OS. In 2015, a line of ransomware was discovered to spread to computers running on Linux, and in 2016, a “ransomware” strain was found to attack Mac computers.
Over the past decade, cryptocurrency ransomware attacks have increased significantly. In 2016 alone, there were 638 million ransomware attacks.
How to protect your device from Ransomware?
There are many websites and security companies that are trying to inform users about the threat of malware (malware) and provide users with tools to prevent this malware as well as Decode the information that has been locked by the attacker.
Popular antivirus services like Avast incorporate additional decryption tools for Windows and Android to help users “address” the growing threat of ransomware.
These are free tools and can prevent many different types of ransomware, although some other ransomware may not be able to be prevented but these tools are also the leading solution to fight ransomware.
No More Ransom is a website that provides news on the latest ransomware development as well as guides users to use tools to combat this threat. This website is a joint effort of the Dutch police, Europol, Kaspersky Lab and Intel Security.
If you find a tool that can help decode ransomware to attack your computer, all you need to do is identify the ransomware. ID Ransomware is a website that helps you do that, all you need to do is upload a ransom copy.
If you’re looking for a tool to protect your Windows computer in real time, CyberReason Ransomfree is the answer for you.
Ransomware has been a threat in the era of internet-connected devices and when IoT becomes popular, it could prove a bigger problem.
Currently, ransomware affects only the device or user file and revokes the user’s access until the attacker gains a ransom, but with the emergence of Smart Home devices, the loss of Access to your device is just getting started.
To avoid the dangers that can lurk and enter your system at any time, select and install one of the best antivirus software for your computer such as BKAV, AVAST … These are all antivirus software best today.