Thursday, August 22, 2019

Word of the Day: ransomware

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | August 22, 2019
ransomware

Ransomware is a subset of malware in which the data on a victim's computer is locked, typically by encryption, and payment is demanded before the ransomed data is decrypted and access is returned to the victim. The motive for ransomware attacks is nearly always monetary, and unlike other types of attacks, the victim is usually notified that an exploit has occurred and is given instructions for how to recover from the attack. Payment is often demanded in a virtual currency, such as Bitcoin, so that the cybercriminal's identity is not known.

Ransomware malware can be spread through malicious email attachments, infected software apps, infected external storage devices and compromised websites. Attacks have also used remote desktop protocol and other approaches that do not rely on any form of user interaction.

How ransomware attacks work

Ransomware kits on the deep web have allowed cybercriminals to purchase and use a software tool to create ransomware with specific capabilities. They can then generate this malware for their own distribution and with ransoms paid to their bitcoin accounts. As with much of the rest of the IT world, it is now possible for those with little or no technical background to order up inexpensive ransomware as a service (RaaS) and launch attacks with minimal effort. In one RaaS scenario, the provider collects the ransom payments and takes a percentage before distributing the proceeds to the service user.

Types of ransomware

Attackers may use one of several different approaches to extort digital currency from their victims. For example:

  • Ransomware known as scareware will try and pose as security software or tech support. Victims may receive pop-up notifications saying malware has been discovered on their system (which, an un-owned security software would not have access to this information). Not responding to this will not do anything except lead to more pop-ups.
  • Screen lockers, or lockers, are a type of ransomware designed to completely lock a user out of their computer. Upon starting up the computer a victim may then see what looks to be an official government seal, leading the victim into believing they are the subject of an official inquiry. After being informed that unlicensed software or illegal web content has been found on their computer, the victim is given instructions for how to pay an electronic fine. However, official government organizations would not do this; they instead would go through proper legal channels and procedures.
  • In encrypting ransomware, or data kidnapping attacks, the attacker will gain access to and encrypt the victim's data and ask for a payment to unlock the files. Once this happens, there is no guarantee that the victim will get access to their data back- even if they negotiate for it.
  • Similar to encrypting ransomware, the attacker may also encrypt files on infected devices and will make money by selling a product that promises to help the victim unlock files and prevent future malware attacks.
  • In doxware, an attacker may also threaten to publish your data online if the victim does not pay a ransom.
  • Mobile ransomware is ransomware which affects mobile devices. An attacker can use mobile ransomware to steal data from a phone or lock it and require a ransom to return the data or unlock the device.
  • The victim may also receive a pop-up message or email ransom note warning that if the demanded sum is not paid by a specific date, the private key required to unlock the device or decrypt files will be destroyed.

While early instances of these attacks sometimes merely "locked" access to the web browser or the Windows desktop -- and did so in ways that often could be fairly easily reverse-engineered and reopened -- hackers have since created versions of ransomware that use strong, public-key encryption to deny access to files on the computer. Continue reading...

Quote of the Day

 
"The catastrophic capabilities of ransomware attacks on public institutions are astounding. If an attack on a major city is successfully carried out, it would likely qualify as a national emergency." - Peter Martini

Learning Center

 

Texas ransomware attack hits 22 municipalities, demands $2.5M
Officials confirmed that a Texas ransomware attack has affected 22 municipalities across the state, however only three victims are known and the investigation is ongoing.

Prevent ransomware attacks on cities in perimeterless networks
Ransomware attacks on cities can be expensive, frustrating or downright deadly. Learn what makes municipalities vulnerable to attack, as well as how shifting the security mindset can keep cities and their citizens safe.

Protect backups from ransomware and other security risks
Backups are an excellent way to return enterprises to a known good state. That's why it's essential to secure and protect backups from ransomware and other security risks, whether man-made or natural. Learn how to align your backup and security strategies for better protection and recovery.

What's the difference between extortionware and ransomware?
Learn the difference between extortionware and ransomware as well as how to defend against them.

How can enterprises mitigate ransomware as a service?
Cybercriminals are using ransomware as a service to increase ransomware attacks on enterprises. Here's what you need to know about the threat.

Quiz Yourself

 
A botnet is a group of computers organized to distribute spam or malware -- _________ the owners are typically unaware of the fact.
a. though
b. although
c. even though

Answer

Stay in Touch

 
For feedback about any of our definitions or to suggest a new definition, please contact me at: mrouse@techtarget.com

Visit the Word of the Day Archives and catch up on what you've missed!

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2019 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: