Ransomware
A dangerous software that holds information or resources hostage in exchange for money.
Intro
After a long day at work, you treat yourself to a cozy corner at your favorite coffee shop, savoring a hot cup of java. As you unwind, you pull out your laptop and indulge in a bit of online browsing for adorable cat pictures. You stumble upon the cutest one yet and, without hesitation, click the download button on a seemingly harmless website. But suddenly, your laptop freezes, leaving you puzzled. Then, a chilling message in bold red font hijacks your screen, declaring, "Look at me, I’m the Captain now! Your device is now under my control! Your data is encrypted, and you must pay a ransom to regain access." In that moment, your heart sinks as you realize—you've fallen victim to ransomware.
You might think that scenario sounds far-fetched, but unfortunately, it's all too common. In reality, ransomware often sneaks into your system through innocent-looking email attachments. Downloading images online is generally less common for ransomware attacks. Ransomware earns its name because it locks your device and encrypts all your data, essentially holding it hostage until you pay a ransom to regain access. It's a despicable tactic used by cybercriminals to extort money from unsuspecting victims, and most often, these criminals target companies by attacking their employees.
What is Ransomware.
Ransomware is malicious software that hijacks your device or locks your files until you pay a ransom to the attacker. It's like digital kidnapping, where your precious data is held hostage until you cough up the cash.
Types of RANSOMWARES.
Ransomware:
A type of malware that seizes control of a device or files and demands payment to unlock access. You just can’t use the device.
It's like a kidnapper who snatches your favorite book and demands payment for its return. Your book isn't encrypted, but you're unable to access it until you meet the ransom demands.
Crypto-Ransomware:
A dangerous kind of ransomware that encrypts your files and data and demands money in exchange for the keys to the encrypted files and data.
WannaCry is one of the most memorable viruses that ever existed. It's like the normal kind of ransomware, but it does not Lock your device. It just encrypts your data and doesn't care if you can see the encrypted gibberish on your device. If you don't have the decryption key, you can't see your childhood photos.
Fake Ransomware:
A persistent type of malware that scares the hell out of you and demands payment to release the captive resource. When in fact, it’s just a stupid annoying cousin to ransomware virus. Meaning, it's just dummy software that does not affect your data. Any reputable IT personnel can remove this persistent fake ransomware.
It's like receiving a phone call from a scammer claiming they have kidnapped a loved one and demanding ransom money for their release. However, you quickly realize it's a hoax because your loved one is safe at home with you. The scammer's goal is to exploit your emotions and extort money without any real threat.
Why this Ransomware exists, how to defend, hmmm.
This kind of malware is widely used to gain money from victims. It also could be used to gain information or leverage between rivals. We can defend against it in a variety of ways. For you, Jonathan, be careful of the attached files in your emails. As for the IT/Cybersecurity department, patch your security resources and update them to the latest signatures. Implement Unified Threat Management for the best network scanning technique. And most importantly, back up your data. And store it offline, do that periodically.
Conclusion.
It is not fun to be unable to use your laptop until you pay some random hacker a few hundred dollars. So, be safe, don’t download anything from untrusted sources. And stay smarter, backup your data, and store the hard drive under your bed. Many ransomware types can sneak into backup drives if they are connected to any powered device.