Ransomware

Ransomware Application


Hello guys !!!

Today I'm bring some interesting topic to you. That is Ransomware. Lets talk about the Ransomware.


What is Ransomware ?

Definition 01 :-

Ransomware is computer malware that installs covertly on a victim’s device (Eg :- computer, smartphone, wearable device) and that either mounts the cryptovirl extortion attack from cryptovirollogy that holds the victim’s data hostage, or mounts a cryptovirology leak ware attack that threatens to publish the victim’s.

Definition 02 :-

Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system’s screen or by locking the user’s files unless a ransom is paid. More modern ransomware families, collectively categorized as Crypto-ransomware, encrypt certain file types on infected system and focus users to pay the ransom through certain online payment methods to get a decrypt key.







Ransom Prices and Payment 

Ransom prices vary depending on the ransomware variant and the price or exchange rates of digital currencies. Ransomware operators commonly specify ransom payments in bitcoins. Recent ransomware variants have also listed alternative payments option such as iTunes and Amazon gifts cards. It should be noted, however that paying the ransom does not guarantee that users will get decryption key or unlock tool required to regain access to the infected system or hostage files.

The Rise of Reveton and Police Ransomware

Revton is a ransomware type that impersonates law enforcement agencies. Known as police Ransomware or police Trojans, these malware are notable for showing a notification page purportedly from the victim’s local law enforcement agency, informing them that they were caught doing an illegal or malicious activity online. 



The Evolution to Crypto-Locker and Crypto-ransomware

A new type of ransomware emerged that encrypted files, aside from locking the system. The encrypted files ensured that victims are forced to still pay the ransom even if the malware itself was deleted. Due to it’s new behavior, it was dubbed as Crypto-locker like previous ransomware types, crypto-ransomware demands payment from affected users, this time for a decrypt key to unlock the encrypted files.

Although the ransom note in Cryptolocker only specifies RSA-2048 as the encryption method used, analysis shows that the malware uses AES + RSA encryption.

RSA is asymmetric key cryptography, which means it uses two keys. One key is used to encrypt the data and another is used to decrypt the data. AES uses symmetric keys, which uses the same key to encrypt and decrypt information.



How to prevent the Ransomware ?

First and foremost, be sure to back up your most important files on regular basis

personalize your anti-spam settings the right way.

Think twice before clicking.

The show file extensions feature can thwart ransomware plagues, as well.

Patch and keep your operating system, anti virus, browsers, Adobe flash player, java and other software up-to-date.

Keep the windows firewall turned on and properly configured at all times. settings up the additional  firewall protection.





Comments

Post a Comment

Popular posts from this blog

Phishing

CySCA 2014 Web Penetration Testing Write-up

Double Submit Cookies Patterns