With the advancement of IT (information technology), many fields including computers and the Internet have become accustomed to their work. In today’s article, we will talk about a recent trend that developers and criminals who use malware to make money
What is ransomware
Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website.
How can software demand extortion?
The special type of software used for ransom is called ransomware. Often these are made by talented programmers who have used their talents to commit crimes. Once ransomware is installed on your computer or smartphone, the software can encrypt your data, or lock your computer or phone.
The software then notifies you that you have to pay some amount online to decrypt or unlock your data.
History of ransomware
Ransomware began to be a headache in 2005, but the history of ransomware dates back to the 80s. A ransomware called AIDS Trojan was released to computers in 1989, but personal computers were scarce at that time. By 2005, the software was once again seen in Russia, making it difficult for people living in countries close to Russia such as Ukraine, Belarus, and Kazakhstan.
By 2010, this ransomware was recognized internationally as a security threat. The first ransomware to use encryption was released to the Internet in 2013. Over time, cybercriminals have become accustomed to delivering the most advanced ransomware and distributing this software as an organized mafia. According to the latest statistics, nearly 4,000 computers worldwide are infected with ransomware.
There are two variants of ransomware
- Locker Ransomware – This type of ransomware lock your computer and ask for ransom to permit access to your computer. These types of ransomware are relatively less vulnerable to harm as they do not affect your computer’s data.
- Crypto Ransomware – This type of ransomware encrypts your data & in such a way that you cannot use again your data until you pay or find out the decryption password .
Encryption and Ransomware
Encryption is a technology used to enhance the security of computers. Encryption is the encryption of messages we send over a computer network, or the information stored on a computer that no one else can read. To decode this type of encoded information, you need a digital key. Only someone with the relevant key can decrypt the encrypted information
Crypto Ransomware uses a computer to encrypt the data and requests a ransom to provide the digital key needed to decode it. Modern encryption is considered impossible to decrypt without a key. For example, the AES-128 encryption system currently used on websites is said to take about 13 billion years for a supercomputer to do bruteforce without the encrypted data keyAs such, it is very likely that someone who is a victim of Crypto Ransomware will lose their data
How does ransomware spread?
These are spread mainly through email attachments or links. When you open a file with an email from a stranger, ransomware may enter your computer. Also, the websites you browse may have ransomware. Therefore, it is very important to take care of what you download from websites you don’t use often.
Ransomware for mobile phones
The first ransomware was reported for the Android operating system in 2014, and ransomware has been able to spread to mobile phones without limiting computers. Most of the ransomware for phones is available in unofficial app stores. There have been reports of some ransomware masquerading as antivirus software over the past two years.
The impact of ransomware
The biggest damage from ransomware is the loss of data. You may lose photos, or photos, that you have collected over the years, or information about your job because of ransomware. For an individual, perhaps this is the case, but if a computer used for the work of a company is damaged, the company can suffer a great loss as well as the reputation of the employee. Several such incidents were reported in our country last year.
What to do if you get caught by a ransomware?
1- Get rid of computer networks as soon as possible – If your computer is already infected with ransomware, it may be able to insert ransomware into another computer on your computer network. So stop the internet, WiFi, LAN, or other online connections as soon as possible.
2- Tell the police – It may be less likely to retrieve your data, but it may be helpful to inform the police IT department when there is such things as corporate data on your computer. Also, inform the IT department of your workplace immediately if the infected computer is one of your workplace.
3- Try removing Ransomware – If your computer has ransomware that does not use encryption, you may be able to save your data. First of all, if you can find the name of the ransomware, look for it on the internet from another computer. The ransomware may have a decoding software attached to it. If not, try removing ransomware by using Safe Mode on your operating system or by reinstalling the operating system.
4- Restore a backup – If you already have a backup, please reinstall it. Even if you lose some work, this is the best timely solution.
5- Think Before you Pay -When there is nothing left to do, the only solution is to pay ransom. But this is not so smart. There are several reasons to say so. They may not release your data even after paying the ransom. Also, if ransomware is left on your computer even after you have received your data, you are not yet in danger. Another point is that the ransom you incite will encourage the ransom. Therefore, it is important to make every effort to avoid paying ransom.
How to Avoid from Ransomware
Since antivirus software has little chance of detecting ransomware, we need to be careful. Adding a few computer-related habits to your life will help you avoid ransomware and many other risks.
- Regularly backup the computer / phone.
- Keep valuable photos, files, etc. in a service like Google Drive or DropBox.
- Update software and operating system.
- Use antivirus software.
- Check the files you are downloading before opening the file type. For example, if you download an exe or apk file instead of an mp3 file in a song, it is definitely a harmful or unwanted file.
- Avoid downloading mobile apps from unknown websites.
- Avoid clicking on links that contain spam or suspicious email messages.
- Use ad-blocker softwares.
in the end, all those who use a computer or a smart device and use the Internet, including but not limited to the IT industry, have a great deal to do with security and privacy. So don’t forget to share it with your friends.