{"id":105105,"date":"2021-05-15T18:02:25","date_gmt":"2021-05-15T12:32:25","guid":{"rendered":"https:\/\/www.mapsofindia.com\/my-india\/?p=105105"},"modified":"2021-05-17T19:18:27","modified_gmt":"2021-05-17T13:48:27","slug":"ransomware-meaning-functioning-and-preventive-measures","status":"publish","type":"post","link":"https:\/\/www.mapsofindia.com\/my-india\/technology\/ransomware-meaning-functioning-and-preventive-measures","title":{"rendered":"Ransomware &#8211; Meaning, Functioning and Preventive Measures"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">Ransomware is a type of malware (a portmanteau of the words &#8216;malicious&#8217; and &#8216;software&#8217; like viruses and Trojans) that encrypts a victim&#8217;s files. It is the extortion software that can lock a computer device. The attacker then demands a ransom from the victim for putting the system&#8217;s data access back upon receiving payment.\u00a0<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Users get directions on how to pay a fee to get the decryption key. The costs could vary from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin. The risk posed by ransomware relies on the variant of the virus. The primary thing to focus on is that there are two key categories of ransomware: locker ransomware, where basic computer functions are affected, and crypto-ransomware, where individual files are encrypted.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Blackmailing computer users through this way is not a 21st-century invention. A primitive pioneer of ransomware was put in place as early as 1989. In 2005, someone reported the first concrete instance of ransomware in Russia. Since then, ransomware has propagated across the world, with new kinds continuing to prove effective. A sudden increase in ransomware attacks was notable in 2011. Considering the upcoming attacks, since 2016, manufacturers of antivirus software have sharply emphasised their virus scanners on ransomware.<\/span><\/p>\n<p><strong>One can see regional changes in the various ransomware attacks. For example:<\/strong><\/p>\n<ul>\n<li><u><span data-preserver-spaces=\"true\">Inaccurate messages about unlicensed applications:<\/span><\/u><span data-preserver-spaces=\"true\">\u00a0In some countries, Trojans admonish the victim that unlicensed software is installed on their computer. The message then urges the user to make a payment.<\/span><\/li>\n<li><u><span data-preserver-spaces=\"true\">Wrong claims about illegal content<\/span><\/u><span data-preserver-spaces=\"true\">: There are countries where illegal software downloads are a usu practice; this is not particularly successful for cybercriminals. Instead, ransomware messages allege that they are from law enforcement agencies and that child pornography or other illegal content has been discovered n the victim&#8217;s computer. The message also consists of a demand for a penalty fee to be paid.<\/span><\/li>\n<\/ul>\n<h2>Working of Ransomware<\/h2>\n<p><span data-preserver-spaces=\"true\">There are multiple vectors ransomware takes to access a computer device. One of the most ordinary delivery systems is phishing spam, where attachments come to the victim through an email, disguising them as a file they should trust. Once they&#8217;re downloaded and opened, they can take over the victim&#8217;s computer, especially if they have built-in social engineering tools that play on users into permitting administrative access. Some more aggressive forms of ransomware, such as NotPetya, take undue security holes to infect computers without requiring to trick the users.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">There are multiple things the malware might do once it&#8217;s captured over the victim&#8217;s computer, but by far, the most common action is to encrypt some or all of the user&#8217;s files and data. If one wants the technical details, the Infosec Institute has an excellent in-depth look at how different flavours of ransomware encrypt files. But the most vital part is to know the eventual process; the files cannot be decrypted without a mathematical key that only the attacker knows. The user is presented with a message describing that their files are now unreadable and will only be decrypted if the victim credits an untraceable Bitcoin payment to the cyber attacker.<\/span><\/p>\n<h3>Preventive steps against ransomware<\/h3>\n<ol>\n<li><span data-preserver-spaces=\"true\">Keep your operating system patched and updated to have fewer vulnerabilities to exploit<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Don&#8217;t install software on your device or give it administrative privileges unless you know precisely what it is and what it does or its functioning<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Install antivirus software, which can check malicious programs like ransomware as they enter, and whitelisting software, which prevents unauthorised applications from implementing in the first place.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Don&#8217;t forget to back up files and data frequently. That won&#8217;t cease a malware attack, but it could make the threat caused by one much less impactful on your device<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a type of malware (a portmanteau of the words &#8216;malicious&#8217; and &#8216;software&#8217; like viruses and Trojans) that encrypts a victim&#8217;s files. It is the extortion software that can lock a computer device. The attacker then demands a ransom from the victim for putting the system&#8217;s data access back upon receiving payment.\u00a0 Users get [&hellip;]<\/p>\n","protected":false},"author":21815,"featured_media":105120,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6124],"tags":[],"class_list":{"0":"post-105105","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/105105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/users\/21815"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/comments?post=105105"}],"version-history":[{"count":2,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/105105\/revisions"}],"predecessor-version":[{"id":105121,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/posts\/105105\/revisions\/105121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media\/105120"}],"wp:attachment":[{"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/media?parent=105105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/categories?post=105105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mapsofindia.com\/my-india\/wp-json\/wp\/v2\/tags?post=105105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}