Sunday, February 2, 2014

Cyber Extortion: How to Deal With It? -By Anita J Alonso


Modern computer users, apart from security industry experts, are struggling to deal with severe technological risks of the present times. However, attackers are advancing their cyber intrusion tactics and devising newer ways to trick innocent Internet users for financial benefits. Ransom-ware is a new and distinct variant of malware which takes the route of channeling money by way of extortion.

Ransom-ware enables an individual with malicious intentions to take control of victim's PC and encrypt his/her vital data. An attacker would now charge desired amount from the victim to allow him/her access to his/her own data. Saddening though, it has become a lucrative way for cyber attackers to make money. Some ransom-ware warning messages are designed to scare victims into giving out money to get rid of such a crime. However, paying money does not ensure victim of freedom from such an attack in future. Also famously referred to as 'FBI virus', they often flash fake messages which pose to be from a local authority asserting that victim is performing illegal activities on his/her computer and should pay fine to be freed from such an allegation.
How Do Ransom-ware Attack?
Ransom-wares come over Spam emails as attachments, and infect a system when an individual clicks open such a malicious mail. A victim may also get infected by ransom-ware by clicking a malicious link in such emails or by visiting compromised websites. They, generally, are Trojan horses and computer worms which take control over a user's PC by exploiting system vulnerabilities. They may attack a computer in two ways- either by locking it and making it unusable for the victim, or by encrypting certain files by a password. A ransom-ware may also pose as a virus scanner, which detects few issues in your system and flash pop-up messages advising cleaning up the same. But, these messages are often fake.
How to deal with a Ransom-ware infection?
It is advisable to never give away ransom amount to attacker, as giving money is never an assurance of getting hold of your important files. If you are fortunate enough to get away with the trouble by paying ransom money, still you cannot deny the fact that your sensitive information already got exposed to a malicious stranger who can misuse it at a later stage.
It is always better to report such a crime and make the attacker bear the consequences. This will also be instrumental in curbing such attempts with someone else in future. However, victims avoid going this way, as they don't want to take the hassle of reporting the scam and being at the center stage.
Treat the ransom-ware infection as you would treat any other attack. Identify the route through which it came over and look out for other infections, which would have come along with it, as well as system loopholes.
Run a full system scan to clean your computer. Get a reputed malware protection software. Certain software vendors do offer tools to decrypt the encrypted or locked files on your PC. It is better to clean your computer and lookout for other potential threats as soon as possible, as you never know when the attacker may get hold of your system and encrypt all the contents in the hard disk, or even make your system unusable.
Strengthen your PC's security. On encountering a ransom-ware attack you know that your system's security program is not fool proof and needs further improvement. If such a risk exists, you never know what else a malware could do. Get an advanced security application which is capable of protecting you and your resources from most critical risks.
Aside all the precautions, knowledge is the best rescue. Organizations must inform their staff about such risks and train them to handle these.
Author of this article is a learned content expert, who has many technological articles to her credit. Author is associated with Unistal Systems Pvt. Ltd. Unistal is a leading software and applications development firm with a diverse product range in the PC security industry. Its security applications come as a result of constant innovation and research.
Article Source: http://EzineArticles.com/8010796

No comments:

Post a Comment