Table of contents:
2024 Author: Malcolm Clapton | [email protected]. Last modified: 2023-12-17 03:44
Experts predict that ransomware will become the most serious threat to users in the near future. With their help, cybercriminals can earn up to $ 5 billion this year.
What is ransomware and how it works
The study identifying the top cyber threats of 2017 was conducted by Acronis, a hybrid cloud storage and protection company.
Most of the survey participants admitted that they had not heard anything about ransomware, but considered their personal data (documents, photos, videos, music) very valuable. Their recovery from an attack by such malware can cost a decent amount - over $ 500.
It also turned out that over a quarter of those surveyed had never made backups. And more than 34% said they had already lost their personal data.
Ransomware works simply. They reach the device (for example, via email) and encrypt the user's data. The hackers then demand a ransom.
Attackers attack not only large companies or government structures, but also ordinary people, because they are also willing to pay.
Here is just one example of a ransomware program called Osiris. This Trojan easily bypasses Windows Defender, attacks data backups and refuses to run in a virtual environment.
Earlier this year, Osiris infected the computers of the police department in the American city of Cockrell Hill. As a result, the data of criminal cases (evidence, photos, videos) for the last eight years were lost. The protection was unable to prevent the irrecoverable loss of information.
What's in store for us in the near future?
- The ransomware epidemic will grow exponentially. In 2016, hackers earned about $ 1 billion with their help, in 2017 this amount may increase fivefold.
- The number of "strains" of this malware will grow.
- The number of ransomware distributors will increase. One of the principles of the virus is copying the SaaS (software as a service) model, for which a huge number of small distributors are involved. Their only purpose is to infect target computers. You don't need any special technical knowledge to do this. It is enough to have your own computer and be ready to break the law.
- Ransomware distribution technologies will get even more cunning. At the end of 2016, one of the most ingenious distribution schemes to date emerged. The user was promised a free decryption key if he infected two other users with malware. It is assumed that this idea was taken from the famous horror movie "The Ring".
- Various phishing scams will remain the most common type of attack. But they will be even more personalized and effective. Ransomware will increasingly use encryption tools instead of blockers.
- New methods of pressure on victims will appear. Technologies allow increasing the size of the ransom and deleting files every hour until the user pays. Ransomware is predicted to threaten with the dissemination and publication of confidential and compromising data unless the victim pays the ransom immediately.
- Fewer security vendors will offer free decryptors. Ransomware developers will learn to use the most secure encryption schemes.
- New versions of malware will be able to run in the clouds and will begin to attack, including cloud storage. Users will have to look for cloud providers that can protect their data from such attacks.
What to do?
The rules are still simple:
- Back up your data. Choose backup software with local and cloud storage and active ransomware protection.
- Update your operating system and software regularly. Thanks to this, you will not be affected by known vulnerabilities.
- Without reading, delete suspicious letters, links and attachments. Malicious software enters the system when a user opens an infected email attachment or follows a link to a malicious website.
- Install antivirus software on your computer, enable automatic updates.
Recommended:
How the media influences public opinion and what to do to avoid falling for tricks
Life hacker gives a quick breakdown of how different media shape public opinion and how any of us can resist it
How to do charity properly without falling for the tricks of scammers
All people want to help others, but not everyone knows how to do it. Meanwhile, a whole army of beggars of all kinds is cashing in on human kindness - from fake requests for help on social networks to professional begging in transitions. In this post, you will learn how to distinguish scammers from those who really need help.
What is the effort trap and how to stop falling into it: tips for a freelancer
The article contains several recommendations for a freelancer on how to properly distribute efforts and not waste yourself and your time in vain
How to avoid becoming a victim of pathological perfectionism
Creative success is inextricably linked to persistence. At least that's what the greatest animation director Hayao Miyazaki thinks. You probably saw and remember his creations - the animated films "Howl's Moving Castle", "Princess Mononoke"
How to avoid becoming a victim of scammers when switching to digital TV
The process of switching to digital TV looks so simple that some people wonder if this is really the case. This, as well as human gullibility, is used by malefactors