2016-09-01

Ransomware can happen to anyone, even you.

As you make your way to your workstation to start the day, you’re greeted by an unknown entity saying that you need to pay up $800 to access your computer and all the data stored on it – with no guarantee of actually getting back your files.

Welcome to the world for ransomware. A ransomware attack happens when a cyber criminal gets access to your personal information (via phishing emails, encryption malware, compromised websites, etc.). They demand a “ransom” be paid by you, the victim, typically through untraceable virtual currency like Bitcoin in order for you to get the decryption key.

According to FBI statistics, hackers have extorted over $209 million from organizations through ransomware attacks within the first three months of this year alone. Here are the top three viruses to look out for:

CryptoLocker Ransomware

CryptoLocker came to life in the last quarter of 2013, when cyber criminals, disguised as banks or government institutions, sent phishing emails to organizations with malicious attachments in them.

Through drive-by downloading, this malware would infect victims’ computers and encrypt all the files it could. While still being able to run software and programs on their computer, users would get locked out of their personal files until paying a ransom for the decryption key.

CryptoWall Ransomware

The CryptoWall ransomware appeared in early 2014 and was widely distributed via spam, exploit kits, and malvertisements (malicious advertisements). Unlike CryptoLocker, which uses a countdown timer threatening to delete the decryption key after the allotted amount of time, CryptoWall threatens to double the ransom amount.

According to Dell SecureWorks, researchers found 10,000 victims of this virus during the period of June 10 to 28 from just one domain. The operation is known to have up to five domains.

TeslaCrypt Ransomware

One of the recent variants of the ransomware virus family, TeslaCrypt is deployed through the Angler Exploit Kit – a tool used by cyber criminals to: scan your system for vulnerabilities, exploit those vulnerabilities by downloading malicious code into your computer, and executing that malicious code.

Targeting Windows users, TeslaCrypt, was first detected in January 2015. While it holds your files ransom in a similar fashion to CryptoLocker and CryptoWall, the types of files it goes after are much more varied. The virus steals valuable data off your computer including photos, financial documents, and even saved games.

In order to keep your business protected from the latest family of ransomware attacks, it’s key to stay informed and educate your workforce on security best practices. At ITG, we’ll help you implement critical virus protection solutions and backup software to keep data highly secure out of harm’s reach. Reach out to us today to learn more.

The post 3 Scary Ransomware Viruses to Keep Tab On appeared first on Information Technology Group.

Show more