Table of contents:

Ransomware: how to avoid falling victim to cybercriminals
Ransomware: how to avoid falling victim to cybercriminals
Anonim

Experts predict that ransomware will become the most serious threat to users in the near future. With their help, cybercriminals can earn up to $ 5 billion this year.

Ransomware: how to avoid falling victim to cybercriminals
Ransomware: how to avoid falling victim to cybercriminals

What is ransomware and how it works

The study identifying the top cyber threats of 2017 was conducted by Acronis, a hybrid cloud storage and protection company.

Most of the survey participants admitted that they had not heard anything about ransomware, but considered their personal data (documents, photos, videos, music) very valuable. Their recovery from an attack by such malware can cost a decent amount - over $ 500.

Ransomware: Schedule 1
Ransomware: Schedule 1

It also turned out that over a quarter of those surveyed had never made backups. And more than 34% said they had already lost their personal data.

Ransomware: Schedule 2
Ransomware: Schedule 2

Ransomware works simply. They reach the device (for example, via email) and encrypt the user's data. The hackers then demand a ransom.

Attackers attack not only large companies or government structures, but also ordinary people, because they are also willing to pay.

Here is just one example of a ransomware program called Osiris. This Trojan easily bypasses Windows Defender, attacks data backups and refuses to run in a virtual environment.

Earlier this year, Osiris infected the computers of the police department in the American city of Cockrell Hill. As a result, the data of criminal cases (evidence, photos, videos) for the last eight years were lost. The protection was unable to prevent the irrecoverable loss of information.

What's in store for us in the near future?

  • The ransomware epidemic will grow exponentially. In 2016, hackers earned about $ 1 billion with their help, in 2017 this amount may increase fivefold.
  • The number of "strains" of this malware will grow.
  • The number of ransomware distributors will increase. One of the principles of the virus is copying the SaaS (software as a service) model, for which a huge number of small distributors are involved. Their only purpose is to infect target computers. You don't need any special technical knowledge to do this. It is enough to have your own computer and be ready to break the law.
  • Ransomware distribution technologies will get even more cunning. At the end of 2016, one of the most ingenious distribution schemes to date emerged. The user was promised a free decryption key if he infected two other users with malware. It is assumed that this idea was taken from the famous horror movie "The Ring".
  • Various phishing scams will remain the most common type of attack. But they will be even more personalized and effective. Ransomware will increasingly use encryption tools instead of blockers.
  • New methods of pressure on victims will appear. Technologies allow increasing the size of the ransom and deleting files every hour until the user pays. Ransomware is predicted to threaten with the dissemination and publication of confidential and compromising data unless the victim pays the ransom immediately.
  • Fewer security vendors will offer free decryptors. Ransomware developers will learn to use the most secure encryption schemes.
  • New versions of malware will be able to run in the clouds and will begin to attack, including cloud storage. Users will have to look for cloud providers that can protect their data from such attacks.

What to do?

The rules are still simple:

  1. Back up your data. Choose backup software with local and cloud storage and active ransomware protection.
  2. Update your operating system and software regularly. Thanks to this, you will not be affected by known vulnerabilities.
  3. Without reading, delete suspicious letters, links and attachments. Malicious software enters the system when a user opens an infected email attachment or follows a link to a malicious website.
  4. Install antivirus software on your computer, enable automatic updates.

Recommended: