Modern computer users,
apart from security industry experts, are struggling to deal with severe
technological risks of the present times. However, attackers are advancing
their cyber intrusion tactics and devising newer ways to trick innocent
Internet users for financial benefits. Ransom-ware is a new and distinct
variant of malware which takes the route of channeling money by way of
extortion.
Ransom-ware enables an
individual with malicious intentions to take control of victim's PC and encrypt
his/her vital data. An attacker would now charge desired amount from the victim
to allow him/her access to his/her own data. Saddening though, it has become a
lucrative way for cyber attackers to make money. Some ransom-ware warning
messages are designed to scare victims into giving out money to get rid of such
a crime. However, paying money does not ensure victim of freedom from such an
attack in future. Also famously referred to as 'FBI virus', they often flash
fake messages which pose to be from a local authority asserting that victim is
performing illegal activities on his/her computer and should pay fine to be
freed from such an allegation.
How Do Ransom-ware
Attack?
Ransom-wares come over
Spam emails as attachments, and infect a system when an individual clicks open
such a malicious mail. A victim may also get infected by ransom-ware by
clicking a malicious link in such emails or by visiting compromised websites.
They, generally, are Trojan horses and computer worms which take control over a
user's PC by exploiting system vulnerabilities. They may attack a computer in
two ways- either by locking it and making it unusable for the victim, or by
encrypting certain files by a password. A ransom-ware may also pose as a virus
scanner, which detects few issues in your system and flash pop-up messages
advising cleaning up the same. But, these messages are often fake.
How to deal with a
Ransom-ware infection?
It is advisable to never
give away ransom amount to attacker, as giving money is never an assurance of
getting hold of your important files. If you are fortunate enough to get away
with the trouble by paying ransom money, still you cannot deny the fact that
your sensitive information already got exposed to a malicious stranger who can
misuse it at a later stage.
It is always better to
report such a crime and make the attacker bear the consequences. This will also
be instrumental in curbing such attempts with someone else in future. However,
victims avoid going this way, as they don't want to take the hassle of
reporting the scam and being at the center stage.
Treat the ransom-ware
infection as you would treat any other attack. Identify the route through which
it came over and look out for other infections, which would have come along
with it, as well as system loopholes.
Run a full system scan
to clean your computer. Get a reputed malware protection software. Certain
software vendors do offer tools to decrypt the encrypted or locked files on
your PC. It is better to clean your computer and lookout for other potential
threats as soon as possible, as you never know when the attacker may get hold
of your system and encrypt all the contents in the hard disk, or even make your
system unusable.
Strengthen your PC's
security. On encountering a ransom-ware attack you know that your system's
security program is not fool proof and needs further improvement. If such a
risk exists, you never know what else a malware could do. Get an advanced
security application which is capable of protecting you and your resources from
most critical risks.
Aside all the
precautions, knowledge is the best rescue. Organizations must inform their
staff about such risks and train them to handle these.
Author of this article
is a learned content expert, who has many technological articles to her credit.
Author is associated with Unistal Systems Pvt. Ltd. Unistal is a leading
software and applications development firm with a diverse product range in the
PC security industry. Its security applications come as a result of constant
innovation and research.
Article Source: http://EzineArticles.com/?expert=Anita_J_Alonso
Article Source: http://EzineArticles.com/8010796
No comments:
Post a Comment