Ransomeware has been a huge threat to small businesses and corporations this year. One by one the malware is taking companies data and holding it hostage for a ridiculous sum of money. Take note on each of these variants and the characteristics that go along with them to help you avoid attacks.
Jigsaw ransomware has been known to delete one encrypted file per hour that the ransom is not paid, creating a huge sense of urgency and panic. The ransomware deletes an extra thousand files overtime the computer is restarted.
Petya encrypts Master File Table which contains all the information about how files and data folders are allocated which means it can encrypt entire drives at a time.
RansomWeb & Kimcilware-
Instead of going after users computers, these ransomware variants infect web servers through vulnerabilities and encrypt website databases & hosted files making the website completely unreachable until the ransom is paid.
Lucky, Cerber & Cryptofortress-
These families of ransomware encrypt data on network drives seen those that are not mapped.
Maktub is another ransomeware that encrypts files on your computer, but does so by first compressing them so it can happen a lot quicker.
New versions of ransomware have been able to travel to shared files or cloud storage systems making them susceptible to attacks. No longer is it completely safe to back up your data to cloud storage or file shares.
Ransomeware targeted to non-Windows users. SimpleLocker encrypts Android, Linux.Encode.1 encrypts files on Linux, and KeRanger on Mac OS X.
Using a victims speaker to speak audio messages, Cerber lets you know “Attention! Attention! Your documents, photos, databases and other important files have been encrypted!”
Tox ransomware is a provided code that can often be purchased on the deep web, or underground forums that contains the code to facilitate transfer of funds and the encryption key for the victim to be able to access their information.
The website https://www.nomoreransom.org is now offering information about how to prevent ransomware, as well as 6 different free decryption tools that may get your files back without having to pay the ransom.
As always, if you have a question about the security of your computer, please don’t hesitate to call. Or if you would like a free Network assessment please fill out the form on the right->