What is Ransomware? What makes this threat so deadly?

Header

Author: Trend Micro

July 31, 2021


Ransomware is a destructive type of malware wreaking havoc on both consumers and organizations worldwide. What makes this threat so deadly?

Ransomware is a malicious threat that covertly invades your computer systems with one goal – to make money through digital extortion. To do that, it locks the device’s screen or encrypts the target’s files, thereby preventing or restricting the victim from accessing the device or data. Until the ransom gets paid in bitcoins or other cryptocurrencies, it holds the system and its data hostage. Paying the ransom is risky, as it does not ensure you get the key to decrypt your system. Hence, there is high chances cybercriminals may take the money and run away with it, and worse, steal your data and sell it on the dark web.

Types of Ransomware

Ransomware comes in many variants. However, it broadly falls into two types: Crypto-ransomware and Locker ransomware.

  • Crypto-ransomware: Scans your computer for valuable data, such as documents, photos, or videos. Once found, it encrypts them, rendering them unusable. Note: only the files are affected, there’s no disruption to your computer’s essential functions.
  • Locker ransomware: In contrast to crypto-ransomware, it does not encrypt your computer’s files. Instead, it locks the victim out of their device. The device can restart, but all that appears on the screen is the ransom message.

In both types of attacks, either the victims pay the ransom to recover their system and data, or they would have to endure data loss. That’s why it’s vital to know how ransomware gets distributed into your system, so you won’t fall victim to these malicious actors.

Ransomware Prevention

We cannot stress enough that to protect yourself from ransomware is to prevent infection in the first place. In short, don’t make yourself a possible target for a ransomware attack. As such, we should avoid circumstances and habits that will enable those threat actors to prey on us. Instead, we should cultivate and uphold safe computing. Here are some recommendations that help to defend against ransomware:

  • Don’t use decrepit or obsolete devices, outdated software, and devices with unpatched applications and operating systems
  • Install an effective antivirus solution that delivers proactive protection against ever-evolving malware infections such as ransomware
  • For optimum protection, regularly backing up your files is imperative. Save a copy of your files in two different media and one offsite such as the cloud. Just ensure your cloud storage isn’t a mapped drive in your computer. If there’s a ransomware infection in your computer, your cloud backup won’t get infected, and you can use it to recover your files
  • Maintain the most up-to-date patches for your operating system and other computer programs. Vulnerable applications and operating systems are the targets of most ransomware attacks. Keep up with the most up-to-date patches reduces the number of infection vectors available to an attacker significantly
  • Don’t open suspicious emails or attachments. The attachment could have embedded code that will execute the malware on your computer once you enabled your macros to open the attachment
  • Don’t let anyone borrow or use your USB sticks. In the same manner, don’t borrow anyone else’s too. As your USB stick could become infected, allowing the ransomware to run once you attach it to your computer
  • Avoid visiting dubious websites, as well as clicking on links included in its web content. Additionally, don’t click links on social networking and messenger platforms, especially if they come from strangers. This applies to suspicious or shady emails, too. Your computer may become infected when you carelessly click on a malicious link
  • Don’t overshare personal information on your social media or to any untrusted person. Threat actors may use your identity to conduct fraudulent ways of distributing malware
  • Always download applications from verified, trustworthy official sites. Avoid downloading content from unsanctioned sources
  • Public Wi-Fi networks increase your computer’s vulnerability to a ransomware attack. To ensure your safety, use a secure VPN service while on public Wi-Fi
  • If you have a shared household computer, create separate user accounts with the least privilege to restrict the account’s ability to install and run additional programs. Doing this may help prevent malware from executing or limit its capability to spread through your home network

Let’s Wrap Up

Ransomware keeps evolving. To keep our digital lives safe, it is crucial for us to be multiple steps ahead. Better security habits coupled with a top-notch security solution are vital steps in protecting and defending ourselves from ransomware.

Report a Scam!

Have you fallen for a hoax, bought a fake product? Report the site and warn others!

Help & Info

Popular Stories

As the influence of the internet rises, so does the prevalence of online scams. There are fraudsters making all kinds of claims to trap victims online - from fake investment opportunities to online stores - and the internet allows them to operate from any part of the world with anonymity. The ability to spot online scams is an important skill to have as the virtual world is increasingly becoming a part of every facet of our lives. The below tips will help you identify the signs which can indicate that a website could be a scam. Common Sense: Too Good To Be True When looking for goods online, a great deal can be very enticing. A Gucci bag or a new iPhone for half the price? Who wouldn’t want to grab such a deal? Scammers know this too and try to take advantage of the fact. If an online deal looks too good to be true, think twice and double-check things. The easiest way to do this is to simply check out the same product at competing websites (that you trust). If the difference in prices is huge, it might be better to double-check the rest of the website. Check Out the Social Media Links Social media is a core part of ecommerce businesses these days and consumers often expect online shops to have a social media presence. Scammers know this and often insert logos of social media sites on their websites. Scratching beneath the surface often reveals this fu

So the worst has come to pass - you realise you parted with your money too fast, and the site you used was a scam - what now? Well first of all, don’t despair!! If you think you have been scammed, the first port of call when having an issue is to simply ask for a refund. This is the first and easiest step to determine whether you are dealing with a genuine company or scammers. Sadly, getting your money back from a scammer is not as simple as just asking.  If you are indeed dealing with scammers, the procedure (and chance) of getting your money back varies depending on the payment method you used. PayPal Debit card/Credit card Bank transfer Wire transfer Google Pay Bitcoin PayPal If you used PayPal, you have a strong chance of getting your money back if you were scammed. On their website, you can file a dispute within 180 calendar days of your purchase. Conditions to file a dispute: The simplest situation is that you ordered from an online store and it has not arrived. In this case this is what PayPal states: "If your order never shows up and the seller can't provide proof of shipment or delivery, you'll get a full refund. It's that simple." The scammer has sent you a completely different item. For example, you ordered a PlayStation 4, but instead received only a Playstation controller.  The condition of the item was misrepresented on the product page. This could be the