Well-known examples that will help you identify the dangers posed by
ransomware:
Locky
Locky is ransomware that was first used for an attack in 2016 by a
group of organized hackers. Locky encrypted more than 160 file types
and was spread by means of fake
emails
with infected attachments. Users fell for the email trick and
installed the ransomware on their computers. This method of
spreading is called phishing, and is a form of
what
is
known as social engineering. Locky ransomware targets file types
that are often used by designers, developers, engineers and testers.
WannaCry
WannaCry was a ransomware attack that spread to over 150 countries
in 2017. It was designed to exploit a security vulnerability in
Windows that was created by the NSA and
leaked by the Shadow Brokers hacker group. WannaCry affected 230,000
computers worldwide. The attack hit one-third of all NHS hospitals
in the UK, causing estimated damages
of
92 million pounds. Users were locked out and a ransom payable in
Bitcoin was demanded. The attack exposed the issue of outdated
systems, because the hacker exploited an
operating system vulnerability for which a patch had long existed at
the time of the attack. The worldwide financial damage caused by
WannaCry was approximately US$4
billion.
Bad Rabbit
Bad Rabbit was a ransomware attack from 2017 that spread via
so-called drive-by attacks. Insecure websites were used to carry out
the attacks. In a drive-by ransomware
attack,
a user visits a real website, unaware that it has been compromised
by hackers. For most drive-by attacks, all that is required is for a
user to call up a page that has been
compromised in this way. In this case, however, running an installer
that contained disguised malware led to the infection. This is
called a malware dropper. Bad Rabbit
asked
the user to run a fake Adobe Flash installation, thereby infecting
the computer with malware.
Ryuk
Ryuk is an encryption Trojan that spread in August 2018 and disabled
the recovery function of Windows operating systems. This made it
impossible to restore the encrypted
data
without an external backup. Ryuk also encrypted network hard disks.
The impact was huge, and many of the US organizations that were
targeted paid the ransom sums demanded.
The
total damage is estimated at over $640,000.
Shade/Troldesh
The Shade or Troldesh ransomware attack took place in 2015 and
spread via spam emails containing infected links or file
attachments. Interestingly, the Troldesh attackers
communicated directly with their victims via email. Victims with
whom they had built up a "good relationship" received discounts.
However, this kind of behavior is an
exception
rather than the rule.
Jigsaw
Jigsaw is a ransomware attack that began in 2016. The attack got its
name from an image it displayed of the well-known puppet from the
Saw movie franchise. With each
additional
hour the ransom remained unpaid, Jigsaw ransomware deleted more
files. The use of the horror movie image caused additional stress
among users.
CryptoLocker
CryptoLocker is ransomware that was first spotted in 2007 and spread
via infected email attachments. The ransomware searched for
important data on infected computers and
encrypted it. An estimated 500,000 computers were affected. Law
enforcement agencies and security companies eventually managed to
seize control of a worldwide network of
hijacked home computers that were used to spread CryptoLocker. This
allowed the agencies and companies to intercept the data being sent
over the network without the
criminals
noticing. Ultimately, this resulted in an online portal being set up
where victims could obtain a key to unlock their data. This allowed
their data to be released without
the
need to pay a ransom to the criminals.
Petya
Petya (not to be confused with ExPetr) is a ransomware attack that
occurred in 2016 and was resurrected as GoldenEye in 2017. Instead
of encrypting certain files, this
malicious ransomware encrypted the victim's entire hard disk. This
was done by encrypting the Master File Table (MFT), which made it
impossible to access files on the hard
disk. Petya ransomware spread to corporate HR departments via a fake
application that contained an infected Dropbox link.
Another variant of Petya is Petya 2.0, which differs in some key
aspects. In terms of how the attack is carried out, however, both
are equally fatal for the device.
GoldenEye
The resurrection of Petya as GoldenEye resulted in a worldwide
ransomware infection in 2017. GoldenEye, known as WannaCry's "deadly
sibling," hit more than 2,000 targets –
including prominent oil producers in Russia and several banks. In an
alarming turn of events, GoldenEye forced the personnel of the
Chernobyl nuclear power plant to
manually
check the radiation level there, after they were locked out of their
Windows computers.
GandCrab
GandCrab is unsavory ransomware that threatened to disclose the porn
habits of its victims. It claimed that it had hacked the victim's
webcam and demanded a ransom. If the
ransom wasn't paid, embarrassing footage of the victim would be
published online. After its first appearance in 2018, GandCrab
ransomware continued to develop in various
versions. As part of the "No More Ransom" initiative, security
providers and police agencies developed a ransomware decryption tool
to help victims recover their sensitive
data
from GandCrab.
Anti-ransomware software – what are the benefits?
In addition to these infection-prevention measures, it is also
essential to use appropriate software to protect against ransomware.
For example, using virus scanners and
content filters on your mail servers is a smart way to prevent
ransomware. These programs reduce the risk of spam with malicious
attachments or infected links reaching your
mailbox.
There are many solutions but you need to consult a security
expert to get what is proper for you. This is not something you
simply choose based on reviews or because it
is
working for someone you know. Also, once upon a time Norton was
a WELL-KNOWN brand, but that completely changed but people might
choose it because they are known. NO,
this
is something you have to consider seriously. For example, ever
heard of Gaurd.io? Likely not but it is ONE OF THE best
solutions out there.