What Is Ransomware? 

In this post, we’re going to be talking about ransomware and how you can protect your data from being encrypted.  Ransomware is a type of malicious software that encrypts your data and demands payment before it will decrypt the files. It’s called Ransomware because they are holding your data hostage until you pay. There are many different types of ransomware viruses out there, some more dangerous than others. Some even delete all of your files after encryption if you don’t pay within a certain time frame. In this post, we will go through some of the common types of ransomware, famous malware takeovers, and preventative tips. 

Common Types Of Ransomware

Petya: This is a unique form of ransomware that encrypts the user’s entire computer system. Petya achieves this by rewriting the master boot record. Effectively locking you out of your operating system. 

Goldeneye: This type of ransomware is often spread through massive email campaigns targeting HR departments. When the file is downloaded it encrypts the user’s files and adds an 8-bit character extension at the end. After this, the hard drive is also modified with a custom boot loader. 

Jigsaw: Is a type ransomware that encrypts the user’s data and steadily deletes the data until a ransom is paid. After 1 hour of being infected, Jigsaw will delete one random file and continue to delete more until the 72-hour limit. At this time all the remaining files will be deleted if the ransom is not paid.

Cerber: Is known to specifically target cloud-based Microsoft 365 users and is distributed using an intricate phishing campaign. 

Bad Rabbit: Bad Rabbit targets organizations in Russia and Eastern Europe. It is spread through a fake adobe flash update and when it infects a user, it directs them to a webpage demanding .05 bitcoin. 

Locky: Is often spread as an email as a fake invoice. Once opened Locky begins encrypting a variety of files by using AES encryption.  

WannaCry: Is a ransomware cryptoworm that targets the Windows operating system. This ransomware encrypts user data and demands Bitcoin as a payment. 

Famous Ransomware Takeovers

Buffalo Public Schools 2021

On March 12 ,2021, Buffalo Public Schools experienced an attack that affected roughly 34,000 students and teachers. The attack shut down the entire school system canceling both in-school learning and remote. After spending nearly $10 million in response to the attack, class was resumed on March 22, 2021. It is important to note that while $10 million was spent fighting the attack, no money was given to the attackers.

 

Travelex 2019

On year’s eve 2019 foreign currency exchange Travelex was taken over by a group called REvil. The attackers stole 5GB of data which included files of customer information (credit card info, dates of birth etc.). The website was quickly taken down following the attack but after negotiations with REvil Travelex paid a sum of $2.3 Million to get its data restored,

Ransomware Prevention Tips 

1: Use Anti Virus and a Firewall – Having a reputable antivirus solution that is regularly updated will greatly reduce the likelihood of your device being infected by ransomware. 

2: Back Up Your Data –  By regularly backing up your data you reduce the risk of losing all of your data if the ransomware does end up infecting your computer. 

3: Content Scanning On Mail Servers – Content scanning pre scans for threats and should block most forms of malware.

4: Do Not Pay – By not paying the ransom you a preventing future attacks. Cybercriminals make money from your misfortune and by paying these criminals you are paying them to continue taking people’s valuable data. There is also no guarantee they will restore your data after they are paid. 

5: Keep Systems Up-To-Date – Cybercriminals love outdated software as they can bypass many security updates that have been implemented to help reduce threats. We recommend updating your operating system and drivers regularly in order to prevent a breach. 

6: Train Your Team – Having regular cyber awareness training reduces the chances of one of your endpoints being infected. Knowing what emails are safe to open and having basic knowledge is key to threat reduction. 

In Conclusion

The threat of a ransomware attack or malware infection is very real and can have devastating effects on your home or business. You need to be proactive in order to protect yourself from the dangers that lurk online. We recommend investing in an antivirus solution, providing cyber security awareness training, and backing up any critical data as soon as possible. If you don’t want to go in alone, we’re here for you! Maverick Gardner has been providing IT services since 2012 and would love to help provide peace of mind with our cybersecurity solutions. Contact us today so we can create a plan tailored just for you! 

 

 

Let us know ...

We want to know your experience.  Share and get feedback from our experts.  Your story may help others.

What Is An Internal IT Department?

What Is An Internal IT Department?The Downsides Of An Internal IT DepartmentFinding suitable IT professionals can be time consuming, expensive and occasionally unfulfilling. That is, an SMB may spend a lot of resources on the hiring and recruitment process alone, and...

What Is A Cloud Service?

What Is A Cloud Service?A cloud service is a term used to describe services such as software, platforms and infrastructure hosted for users on the internet. Moving to the cloud is used to provide, easy and affordable access to these various applications without having...

9 Common Types Of Malware

9 Common Types Of MalwareIn this post we will discuss the 9 common types of malware and real world examples for each. The ongoing threat that malware represents significantly impacts both people and businesses on a day-to-day basis. With AV-TEST registering over...

What Is Cyber Resilience?

What Is Cyber Resilience?Cyber resilience is your ability to anticipate, recover from, and adapt to adverse conditions, stresses, attacks, or compromises on systems that use or are enabled by cyber recourses. In other words, it prepares you for cyber attacks....

Managed Services Vs Traditional IT Support

Managed Services Vs Traditional IT Support   The question of whether to use Traditional IT services outsource to Managed Service Providers (MSP) can be a difficult decision. While Traditional IT offers greater control, it can also be costly and time-consuming. MSPs,...

Improve Cybersecurity With 6 Simple Steps

Six Simple Strategies To Improve Cybersecurity As the new year sets in, have you considered how your business's cybersecurity policies might need an update? Many businesses fail to keep up with their security protocols and can be left vulnerable. Investing in...

Cyberattacks Spike During The Holiday Season: Here’s Why

Cyberattacks Spike During The Holiday Season : Here’s Why  The holidays are a time for family, friends, and—unfortunately—cyberattacks. Research shows that cybercrime spikes during the months of November and December, with hackers taking advantage of the busy shopping...

What Is A Zero Trust Security Model?

What Is A Zero Trust Security Model?   The Zero Trust Security Model is a framework for security that emphasizes the need to verify user identities and establish secure communications before granting access to data or systems. The Zero Trust model rejects the...
Maverick GardnerMaverick Gardner