Ransomware

A dangerous software that holds information or resources hostage in exchange for money.

Intro

After a long day at work, you treat yourself to a cozy corner at your favorite coffee shop, savoring a hot cup of java. As you unwind, you pull out your laptop and indulge in a bit of online browsing for adorable cat pictures. You stumble upon the cutest one yet and, without hesitation, click the download button on a seemingly harmless website. But suddenly, your laptop freezes, leaving you puzzled. Then, a chilling message in bold red font hijacks your screen, declaring, "Look at me, I’m the Captain now! Your device is now under my control! Your data is encrypted, and you must pay a ransom to regain access." In that moment, your heart sinks as you realize—you've fallen victim to ransomware.

 

You might think that scenario sounds far-fetched, but unfortunately, it's all too common. In reality, ransomware often sneaks into your system through innocent-looking email attachments. Downloading images online is generally less common for ransomware attacks. Ransomware earns its name because it locks your device and encrypts all your data, essentially holding it hostage until you pay a ransom to regain access. It's a despicable tactic used by cybercriminals to extort money from unsuspecting victims, and most often, these criminals target companies by attacking their employees.

 

What is Ransomware.

Ransomware is malicious software that hijacks your device or locks your files until you pay a ransom to the attacker. It's like digital kidnapping, where your precious data is held hostage until you cough up the cash.

 

Types of RANSOMWARES.

Ransomware:

  • A type of malware that seizes control of a device or files and demands payment to unlock access. You just can’t use the device.

  • It's like a kidnapper who snatches your favorite book and demands payment for its return. Your book isn't encrypted, but you're unable to access it until you meet the ransom demands.

Crypto-Ransomware:

  • A dangerous kind of ransomware that encrypts your files and data and demands money in exchange for the keys to the encrypted files and data. 

  • WannaCry is one of the most memorable viruses that ever existed. It's like the normal kind of ransomware, but it does not Lock your device. It just encrypts your data and doesn't care if you can see the encrypted gibberish on your device. If you don't have the decryption key, you can't see your childhood photos.

Fake Ransomware:

  • A persistent type of malware that scares the hell out of you and demands payment to release the captive resource. When in fact, it’s just a stupid annoying cousin to ransomware virus. Meaning, it's just dummy software that does not affect your data. Any reputable IT personnel can remove this persistent fake ransomware. 

  • It's like receiving a phone call from a scammer claiming they have kidnapped a loved one and demanding ransom money for their release. However, you quickly realize it's a hoax because your loved one is safe at home with you. The scammer's goal is to exploit your emotions and extort money without any real threat.

 

Why this Ransomware exists, how to defend, hmmm.

 This kind of malware is widely used to gain money from victims. It also could be used to gain information or leverage between rivals. We can defend against it in a variety of ways. For you, Jonathan, be careful of the attached files in your emails. As for the IT/Cybersecurity department, patch your security resources and update them to the latest signatures. Implement Unified Threat Management for the best network scanning technique. And most importantly, back up your data. And store it offline, do that periodically.  

 

Conclusion.

It is not fun to be unable to use your laptop until you pay some random hacker a few hundred dollars. So, be safe, don’t download anything from untrusted sources. And stay smarter, backup your data, and store the hard drive under your bed. Many ransomware types can sneak into backup drives if they are connected to any powered device. 

Anas Sabri

Hey there, fellow cyber adventurers!

Ever since floppy disks were a thing (yes, I'm dating myself), I've been knee-deep in the digital world, championing information security before it became the coolest kid on the tech block. With a Bachelor's degree in Computer Science and a passion for all things cybersecurity, I'm on a mission to blend serious skills with a pinch of humor.

Fueled by a passion for all things cybersecurity, I've been diving into the depths of data protection since my university days. Yes, I even took an elective called "Data Privacy and Compliance" because, well, who doesn't love a good challenge?

When I'm not defending digital frontiers, you can find me hiking through the great outdoors, exploring new trails and soaking in the beauty of nature. I also have a penchant for lifelong learning, constantly taking courses to stay ahead of the curve in this ever-evolving field.

Oh, and did I mention my hobby of learning how to greet someone in a new language? There's something special about connecting with people from different cultures, even if it's just with a simple "hola" or "bonjour."

If you're ready to fortify our digital frontiers while sharing a few tech tales and maybe a cyber joke or two, let's connect and embark on this adventure together!

https://www.linkedin.com/in/anas-sabri/
Previous
Previous

Denial Of Service

Next
Next

Social Engineering