Wednesday, May 17, 2017

Ransomware Attack

Top 10 countries with most detection of Ransomware Attack
Ransomware is malicious code that is used by cybercriminals to begin data kidnapping and lockscreen attacks. 

The target for ransomware attacks is across the counter, and unlike distinct types of attacks, the victim is regularly notified that an use for one own ends has occurred and is if instructions for at which point to liberate from the attack. 

Payment is constantly demanded in virtual nut to pull out of the fire the criminal’s identity.

What does ransomware do?
Encrypt files so you can't use them.
Prevent you from accessing Windows.
Stop certain apps from running.

Ransomware stops you from using your PC. There are the difference type of ransomware. Ransomware ask you to something before you can use your PC.

Ransomware is a type of dangerous software that carries inaccurate the cryptographic extortion take up the gauntlet from cryptographic that blocks secure to data until a ransom is paid and displays a announcement requesting expense to disclose it. 

Software automate McAfee issued data pushing that it had collected around 250,000 incredible samples of ransomware in the willingly quarter of 2013.

Below graph show top 10 families of Ransomware Attack in year 2015 to 2016:

Top 10 families of Ransomware Attack in year 2015 to 2016
Figure of Top 10 families of Ransomware Attack in year 2015 to 2016

There are following two types of ransomware:

1) Lockscreen ransomware
2) encryption ransomware

1) Lockscreen ransomware

It shows a full-screen message that prevents you from accessing your PC or files. It says you have to pay money (a “ransom”) to get access to your PC again.

2) Encryption ransomware

It changes your files so you can’t open them. It does this by encrypting the files – see the Details for enterprises section if you’re interested in the technologies and techniques we’ve seen.

Attackers may use one of several different approaches to extort digital currency from their victims. For example:

  • The victim may receive a pop-up message or email warning that if the ransom is not paid by a certain date, the private key required to unlock the device or decrypt files will be destroyed.
  • The victim may be duped into believing he is the subject of an official inquiry. After being informed that unlicensed software or illegal web content has been found on his computer, the victim is given instructions for how to pay an electronic fine.
  • The attacker encrypts files on infected computed devices and makes money by selling a product that promises to help the victim unlock files and prevent future malware attacks.
Below graph show Ransomware Attack in June to November 2015:

Ransomware Attack in June to November 2015
Ransomware Attack in June to November 2015

No comments:

Post a Comment