Don't wanna be here? Send us removal request.
Text
Different types of Ransomware
Ransomware is a malicious software that infiltrates computer systems in the same way as malware, but with a different goal in mind.
Cyber attackers use ransomware to gain remote access to a device, such as a computer. They then hold the data they find on the device hostage, threatening to destroy it or release it unless a ransom is paid - which is why it's known as ransomware.
Ransomware attacks are generally more targeted than malware. Hackers will target specific computer systems belonging to corporate businesses because of the fact that they are more likely to pay a ransom to regain control of their data…and more info - envisionITsolutions.

Common types of ransomware
The first ransomware virus was thought to be PC Cyborg, which appeared in 1998. It used simple symmetric encryption, and it was relatively easy to produce tools to decrypt files that PC Cyborg had encrypted. But it wasn't until 2012, with the arrival of the Reveton worm, that attempts to hold users' computers for ransom payments became commonplace. Reveton locked users out of their computers unless they paid a "fine" through a payment service such as Ukash. Two years later, CryptoLocker was released, encrypting user files and demanding a ransom for the key to decrypt them. This became the template for most subsequent types of ransomware that have appeared since.
There are two main types of ransomware: Locker ransomware, which locks the computer or device, and Crypto ransomware, which prevents access to files or data, usually through encryption.
Locker Ransomware
Reveton: Reveton ransomware started appearing at the end of 2012, locking users' computers by preventing them from logging in and displaying an official-looking message purporting to come from the FBI or a national police force (depending on the location of the infected computer). The message said that the user had been involved in illegal activity such as child pornography or software piracy, and that they could avoid further action and regain access to their computers by paying a "fine." Later versions also included password-stealing software that remained active even if the user paid the ransom…to know more, visit – eSecurity Planet.
CryptoLocker: Ransomware has been around in some form or another for the past two decades, but it really came to prominence in 2013 with CryptoLocker. The original CryptoLocker botnet was shut down in May 2014, but not before the hackers behind it extorted nearly $3 million from victims. Since then, hackers have widely copied the CryptoLocker approach, although the variants in operation today are not directly linked to the original. The word CryptoLocker, much like Xerox and Kleenex in their respective worlds, has become almost synonymous with ransomware.

CryptoWall: CryptoWall gained notoriety after the downfall of the original CryptoLocker. It first appeared in early 2014, and variants have appeared with a variety of names, including CryptoBit, CryptoDefense, CryptoWall 2.0, and CryptoWall 3.0. Like CryptoLocker, CryptoWall is distributed via spam or exploit kits…and more on datto.
Ransomware can attack a wide range of devices, including:
PCs,
Macs
Smartphones
If the affected device is also attached to a network drive, the shared files are likely to be encrypted as well, regardless of which operating system is running.
Cybercriminals who launch ransomware are getting increasingly good at avoiding law enforcement agencies, which makes it harder to track down and close modern crypto-operations. Payment is normally demanded in Bitcoin, which is very difficult to trace, and the attackers’ command and control servers may be hidden in the anonymous Tor network…and more info over at - ITPRO.
Prevention is always better than cure, so make sure that you have business-grade anti-virus and anti-spam software solutions installed, and that these are always kept up-to-date. You can also hire the solutions of Duocircle and get better ransomware protection. Anti-spam software will help to detect any suspicious Emails and prevent them from entering your inboxes. Anti-virus software will detect malware threats and halt them before they are able to do any harm to your systems. It's better to be safe than sorry.
1 note
·
View note