{"id":69,"date":"2009-01-10T21:42:44","date_gmt":"2009-01-11T02:42:44","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/?p=69"},"modified":"2022-12-30T12:05:31","modified_gmt":"2022-12-30T17:05:31","slug":"ransomware-gets-tougher","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/ransomware-gets-tougher\/","title":{"rendered":"Ransomware Gets Tougher"},"content":{"rendered":"<p><a href=\"https:\/\/www.zonealarm.com\/anti-ransomware\/\" target=\"_blank\" rel=\"gets ransomware tougher noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"Ransomware Gets Tougher\" src=\"https:\/\/i0.wp.com\/sc1.checkpoint.com\/sc1\/za\/images\/landing\/anti-ransomware\/threat_icon.png?resize=69%2C55&#038;ssl=1\" alt=\"Ransomware Gets Tougher\" width=\"69\" height=\"55\" \/><\/a>Anti-malware vendor <a href=\"http:\/\/www.trendmicro.com\" target=\"_blank\" rel=\"noopener noreferrer\">Trend Micro<\/a> has <a href=\"https:\/\/blog.trendmicro.com\/trendlabs-security-intelligence\/new-gpcode-trojan-holds-victims-files-hostage\/\" target=\"_blank\" rel=\"noopener noreferrer\">noted<\/a> an increase in <strong><a title=\"Ransomware (malware)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Ransomware_%28malware%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">ransomware<\/a><\/strong>. According to <a href=\"http:\/\/en.wikipedia.org\/wiki\/Ransomware_(malware)\" target=\"_blank\" rel=\"noopener noreferrer\">Wikipedia<\/a> ransomware is a type of <strong>malware<\/strong> that <strong>encrypts the data<\/strong> belonging to an individual on a computer, <strong>demanding a ransom for its restoration<\/strong>.<\/p>\n<p>This type of ransom attack can be accomplished by (for example) attaching a specially crafted file\/program to an e-mail message and sending this to the victim. If the victim opens\/executes the attachment, the program encrypts a number of files on the victim&#8217;s computer. A ransom note is then left for the victim. The victim will be unable to open the encrypted files without the correct <a title=\"Encryption\" href=\"http:\/\/en.wikipedia.org\/wiki\/Encryption\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">decryption key<\/a>.<\/p>\n<p>Once the ransom demanded in the ransom note<strong> is paid<\/strong>, the <strong>attacker may (or may not) send the decryption key<\/strong>, enabling decryption of the &#8220;kidnapped&#8221; files.<\/p>\n<p>Recently, Trend Micro Advanced Threats Researcher Ivan Macalintal reported that a new version of the GPcode ransomware has surfaced, It is said that Gpcode[dot]ag utilizes a 660-bit RSA public modulus. Attackers appear to be upping the ante, in early June 2008, another Gpcode variant, Gpcode [dor]ak, has been detected and researchers believe it utilizes an <a title=\"RSA (algorithm)\" href=\"http:\/\/en.wikipedia.org\/wiki\/RSA_%28algorithm%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">RSA encryption<\/a> algorithm with a 1024-bit public key. &#8220;We estimate it would take around 15 million modern computers, running for about a year, to crack such a key,&#8221; writes Aleks Gostev, senior virus analyst at <a title=\"Kaspersky Lab\" href=\"https:\/\/www.kaspersky.com\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Kaspersky<\/a>, on the company&#8217;s blog.<\/p>\n<p>The rise of ransomware makes <strong>regular successful data backups even more important<\/strong>. With current backups, you can delete the files in question, restore them from your backup and let someone else pay the attacker.<\/p>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware getting tougher by using RSA encryption algorithm with a 1024-bit public key needs 15 million computers, running for 1 year to crack<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[3216,27,824,23,1507,2236,152],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-malware","tag-3216","tag-data-security","tag-encryption","tag-malware","tag-ransomware","tag-rsa","tag-trend-micro"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":4,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":123921,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/69\/revisions\/123921"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}