ransomware attack

Ransomware, Is Your Company Prepared If Attacked?

Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion. It encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them. In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Paysafecard or Bitcoin and other cryptocurrencies that are used for the ransoms, making tracing and prosecuting the perpetrators difficult.

Ransomware experts predict there will be a ransomware attack every 11 seconds in 2021. This fact may scare you unless you have a professional agency like SokoTek managing your IT and Cyber Security. It’s best to have a team of experts to implement the right IT security software and monitoring systems to track your company’s internet and server activity. There are many ways to prevent ransomware attacks. Data breaches should be taken seriously in any type of business. This means someone outside your corporation has gained access to your company information. This can be a big problem for your business information. Ransomware hackers take advantage of a security breach and hold information for a ransom to be paid or sell your information for their profit.

Online Ransomware, Keep Your Staff Educated On The Different Types And Forms Of Attacks.

There are 2 main types of ransomware. Crypto-Ransomware or Locker-Ransomware.

Crypto-Ransomware is when an attacker encrypts valuable files on a victim’s computer so that they cannot access them.

Locker-Ransomware attackers do not encrypt files but rather the attacker locks the victim out of their device, so they cannot use it. Once the victim is locked out the cybercriminals will demand a ransom to unlock the device.

There are 10 famous forms of ransomware each is different and dangerous in its own way and can be harmful to any corporation.

Locky- With the ability to encrypt over 160 file types they use phishing by sending fake emails with infected attachments that victims install which locks them out of their device.

Wannacry- Designed to exploit a vulnerability in Windows is used against hospitals with out-of-date computer systems. The victims are locked out and the cybercriminals demand a ransom for reaccess.

Bad Rabbit- This attack is when a victim goes to what they think is a legitimate website and installs something like adobe flash that is malware in disguise.

RYUK- Disables the windows system restore option, making it impossible to restore encrypted files without a backup.

Troldesh- This form of attack is spread via spam emails with infected links or attachments. The troldesh attackers will communicate through email to demand ransoms.

Jigsaw- This attack form gets its name from the Saw film franchise. Jigsaw gradually deletes more of the victim’s files each hour that the ransom demand is left unpaid. They also use the Saw horror movie imagery to add distress to the victim.

Cryptolocker- first seen in 2007 and spread through infected email attachments. Once in the computer, it searches for valuable files to encrypt and hold to ransom.

Petya- Rather than encrypting specific files, this vicious ransomware encrypts the victim’s entire hard drive then encrypting the primary file table making it impossible to access files on the disk

Goldeneye- The resurgence of Petya, forced workers at a nuclear plant to check radiation levels manually as they had been locked out of their Windows PCs.

Gandcrab-  GandCrab cybercriminals demand a ransom, or otherwise, they would make embarrassing footage public.

Not sure if your company is protected from a cyberattack? Contact SokoTek for a FREE Consultation!


Liana, IT Consultant

Leave a comment

Your email address will not be published. Required fields are marked *

Get Out Of Computer Trouble

Book A Consult

Get Out Of Computer Trouble

Book A Consult