
[Media] XSS Attacks Across SNS: A Historical Analysis
November 20, 2023
News Center Template
December 13, 2023What is Ransomware? Definition, Risks, Examples, Prevention

1. What is Ransomware?
2. Risks of Ransomware
Ransomware poses a pervasive threat, targeting nearly every operating system, from mobile to macOS, leaving users vulnerable at any given moment. Even in cases where victims decide to pay the hackers, there’s no assurance that their files will be fully restored; in some instances, the data vanishes despite complying with the extortion demands. The immediacy of its impact is felt as it swiftly encrypts files on the victim’s computer, exerting pressure on memory resources. Even after the malware is eradicated, its aftermath lingers, leading to a significant performance degradation of over 90%.
3. How Ransomware Works and Types of Attacks
Ransomware infiltrates your system through various avenues such as email attachments, phishing sites, and downloads. Once inside, it initiates a surge in CPU, hard disk, and memory usage, commencing the encryption process on files. This encryption renders user data inaccessible. Following the encryption, the ransomware dispatches a message to the user, demanding payment of the ransom. Typically, these ransoms are paid in cryptocurrency, accompanied by threats of permanent damage or public release of files if the payment is not made.
Crypto Ransomware
Directly encrypts files or data on the victim’s disk using robust encryption algorithms, making file recovery extremely challenging without the specific decryption key. Crypto ransomware commonly infiltrates systems through email attachments, malicious ads, and phishing websites.
Locker Ransomware
Operates by locking down a user’s entire system or specific functions, preventing normal computer usage. To regain access, victims are coerced into paying a ransom to unlock their system.
Scareware
Disguised as fake security software or cleanup tools, scareware induces fear by presenting fake virus warnings or system error messages. Users are then pressured into paying for fraudulent security software to resolve the non-existent issues.
Doxware
Focuses on stealing personal information and subsequently extorting a ransom to prevent the disclosure of this sensitive data. The term “doxing” refers to the act of harvesting and publishing individuals’ personal information online.
4. Attack Methods Recognized by International Standards
Malware Hidden in Common Files
Ransomware often infiltrates systems by concealing itself within seemingly harmless files. Attackers embed ransomware in attachments that masquerade as ordinary documents, executables, or multimedia files – the same file types susceptible to the malware mentioned in the article.
Disguised Attachments
Similar to the discussion on various file types disguising malware, ransomware adopts the same camouflage strategy. The unsuspecting user, upon opening these infected files, unknowingly triggers the execution of the ransomware.
Use of Encrypted Files
The reference to encrypted extensions aligns with ransomware characteristics. Ransomware is notorious for encrypting users’ files and demanding a ransom for the decryption key. An encrypted file embedded in an email can serve as the initial breach point, activating the ransomware upon execution.
Sender Address Spoofing
Commonly employed in phishing emails for ransomware distribution, sender address spoofing aims to make the email appear from a trusted source. By manipulating the sender’s address, attackers increase the likelihood of recipients opening the attachment, inadvertently installing the ransomware.
5. Case Study
Wannacry
On May 12, 2017, the world witnessed the outbreak of WannaCry, a highly contagious virus leveraging worm-like characteristics. This malicious software made a global impact, infecting 300,000 PCs across 150 countries, including major nations like the United States, United Kingdom, and Russia. It ruthlessly crippled computer networks in hospitals, banks, and businesses, causing extensive disruptions worldwide. The estimated damage ranged from $4 billion to $8 billion, solidifying WannaCry as one of the most financially devastating cyber incidents in history.
NotPetya
6.How to Avoid Ransomware
Comply with the International Email Security Standard
First, to respond to the threat of new malware attacks, it is necessary to conduct behavior-based analysis to detect new viruses that are not registered in patterns. Second, it is recommended to scan the attachments contained in incoming emails and quarantine them if they are determined to be malicious. Third, all URLs should be checked for malware, and the final URL within multiple linked URLs should be tracked.
Update your security software
Install antivirus software from leading vendors that are proven to provide good protection, and regularly keep your antivirus and security software up to date to increase your defense against new ransomware.
Strengthen network security
Prevent the propagation of ransomware through strong firewall and intranet security. It’s important to understand the core principles of network defense. Encryption, access control, and surveillance and detection can prevent security incidents before they happen.
Regular backups
Regularly backing up your data is a crucial defense against ransomware attacks because they allow you to restore lost or corrupted data and recover from cyberattacks. It’s important to back up your important files regularly so that you have a backup to recover your data in the event of a ransomware infection.
7. Solution
8. References
nomoreransom
https://www.nomoreransom.org/en/index.html
Will DarkSide Pipeline Ransomware Attack Fuel Cybersecurity Upgrades for Critical Infrastructure?
WannaCrypt ransomware worm targets out-of-date systems
ITU-T Recommendations
https://www.itu.int/ITU-T/recommendations/rec.aspx?rec=15710&lang=en