RANSONWARE ATTACK

 

  DEFINITION : Ransomware  is  a  type  of  
 malware  attack  in  which the  attacker  locks or prevents  victim  data  or  imported  files  and  demanding  for  payment  to  unlock  the  same . 




                                    Types of Ransomware attack

1.AIDS  Trojan (1989)  
2. Crypto Locker (2013)                                                                         3. Tesla Crypt (2015)
 4. Petya (2016)
  5. WannaCry (2017)
  6. SamSam (2018)
  7.Ryuk (2019 and 2020) 



AIDS Trojan Ransomware Attack :-  It  is  first  resister   ransomware  in  history  using  infected  floppy  disks . It  hides  file  directories  and  blocking  file  name  and  ask  the  victim  to  pay  USD  189 .


Crypto Ransomware Attack :- This  attack  was  an  milestone  on  its  time  in  than  year  2013. It  causes more  than  USD  3  million  . It  was  mainly  distributed by via  email , using  malicious  files .


Tesla Crypt Ransomware Attack :- In  the  initial  stage  blocking  maps  and user  profiles . In  next  version  it  was  able  to encrypt  other  files  .Eg PDF and  Word . And  affected  victim  was  forced   for  pay  at least  USD  200  to release files .


Petya Ransomware Attack     :- It  attack  via  mail  with malicious  attachment . It  blocks  entire  operating  system  and  demanding  for  USD  300  . It  affects  many banks  and  companies in  the  areas  of  transportation .       


WannaCry Ransomware Attack  :- It  is  most  devastating  ransomware  attack .It  spread  via  email  scams  or  phishing  .          Many  people  and  companies  were affected .


SamSam Ransomware Attack :-  SamSam is Ransomware that 'spies' long time after its initial infection, without being detected. SamSam uses vulnerabilities to attack specific organization. The creators of the ransomware ask for ransom after SamSam removes or makes it impossible for the victim to access his own data


Ryuk Ransomware Attack :-

It is a type of ransomware known for targeting large, public-entity Microsoft windows cyber systems. It typically encrypts data on an infected system, rendering the data untraceable bitcoin. Ryuk is believed to be used by two or more criminal groups, most likely Russian, who target organization rather than individual consumer.




Ransomware Works

Ransomware doesn’t necessarily begin immediately after a system has been compromised. In many cases, individual computer systems or networks are compromised by cybercriminals who specialize in obtaining an initial point of compromise. Access to those networks is then sold as part of RaaS. In other circumstances, threat actors wait until a system is idle before beginning encryption, increasing the chances that the compromise will go undetected

Ransomware software is also a type of malicious software program it manly used by the criminal and hostile nation-states to infect the computer system of the victim and hold their data for ransom. Ransomware has evolved considerably over the past few decades, taking advantage of multiple routes to achieve infection, as well as novel extortion techniques. 


                       Prevention of Ransomware


1.   Never click on unsafe links: Avoid clicking on links in spam massage or unknown website

2.   Avoid disclosing personal information: if you receive a call, text message, or email from an untrusted source requesting personal information, do not replay.

3.   Do not open suspicious email attachment: Ransomware can also find its way to your devise through email attachment. Avoid opening any dubious- looking attachment.

4.   Never use unknown USB sticks: Never connect USB sticks or other storage media to your computer if you do not know where they came from.

5.   Use only known download source: to minimize the risk of downloading  ransomware , never download software or media file from unknown site.

6.   Use VPN service on public wi-fi networks: Conscientious use of public wi-fi network  is a sensible protective measure against ransomware. When using a public wi-fi network, your computer is more vulnerable to attack. 






                                                    








Comments