{"id":73254,"date":"2014-11-04T19:52:37","date_gmt":"2014-11-05T00:52:37","guid":{"rendered":"http:\/\/rbachnet.wwwmi3-ss40.a2hosted.com\/index.php\/"},"modified":"2021-08-24T16:42:05","modified_gmt":"2021-08-24T20:42:05","slug":"what-is-ransomware","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/what-is-ransomware\/","title":{"rendered":"What is Ransomware?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-96768\" title=\"What is Ransomware?\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1.jpg?resize=118%2C118&#038;ssl=1\" alt=\"What is Ransomware?\" width=\"118\" height=\"118\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/><a title=\"Ransomware\" href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA14-295A\" target=\"_blank\" rel=\"noopener noreferrer\">Ransomware<\/a> is a nasty form of malware. It is also known as data kidnapping. It locks up your computer by <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/encryption\" target=\"_blank\" rel=\"noopener noreferrer\">encrypting<\/a> your data and then demanding you pay a fee to unlock them. The fee is usually in <a href=\"https:\/\/en.wikipedia.org\/wiki\/Bitcoin\" target=\"_blank\" rel=\"noopener noreferrer\">Bitcoins<\/a>. The decryption <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/key\">key<\/a> may or may not unlock your files. Ransomware can be terrifying. We rely so completely these days on our PCs that to stare helplessly at yours\u2014often with a racy image on the screen\u2014is frustrating and crippling to your productivity.\u00a0Cybercriminals may use one of several tactics to extort money from their victims.<\/p>\n<h3>Tactics to extort money<\/h3>\n<p><strong>1.\u00a0<\/strong>After a victim discovers he cannot open a file, he receives an <strong>email ransom note<\/strong> demanding a relatively small amount of money in exchange for a <a href=\"http:\/\/searchsecurity.techtarget.com\/definition\/private-key\" target=\"_blank\" rel=\"noopener noreferrer\">private key<\/a>. The attacker warns that if the ransom is not paid by a certain date, the private key will be destroyed and the data will be lost forever.<\/p>\n<p><strong>2.\u00a0<\/strong>The victim is duped into believing he is the subject of a<strong> police inquiry<\/strong>. After being informed that <strong>unlicensed software or illegal web content<\/strong> has been found on his computer, the victim is given instructions for how to pay an electronic fine.<\/p>\n<p><strong><a href=\"https:\/\/web.archive.org\/web\/20121026193628\/http:\/\/www.security-faqs.com:80\/hiding-malware-in-an-image-file.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-96773 \" title=\"Avoid sketchy websites\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1-1.jpg?resize=72%2C112&#038;ssl=1\" alt=\"Avoid sketchy websites\" width=\"72\" height=\"112\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1-1.jpg?resize=96%2C150&amp;ssl=1 96w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1-1.jpg?resize=48%2C75&amp;ssl=1 48w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/malware-1-1.jpg?w=300&amp;ssl=1 300w\" sizes=\"auto, (max-width: 72px) 100vw, 72px\" \/><\/a>3.<\/strong> The attackers sneak malware onto a computer, usually by a <a href=\"https:\/\/searchenterprisedesktop.techtarget.com\/definition\/drive-by-download\" target=\"_blank\" rel=\"noopener noreferrer\">drive-by download<\/a>, which\u00a0encrypts the victim&#8217;s data but does nothing else. In this approach, the data kidnapper anticipates that the victim will look on the Internet for how to fix the problem and makes money by <strong>selling anti-ransomware software<\/strong> on legitimate websites.<\/p>\n<h3>Cut your ransomware risks<\/h3>\n<p>Here are tips that cut your risk of becoming a victim.<\/p>\n<p>1.<strong> Avoid sketchy websites<\/strong>, searches, and downloads. You know the old expression \u201cYou can\u2019t cheat an honest man\u201d? Well, many (though not all) <a title=\"Ransomware (malware)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Ransomware_%28malware%29\" target=\"_blank\" rel=\"noopener wikipedia noreferrer\">ransomware<\/a> infections begin when a user surfs to pornographic or gambling websites, while others start with a click on a suspicious link. Steer clear of sites known to house malware, and never click a link in an email unless you know it is legit.<\/p>\n<p>2. <strong>Back up your data<\/strong>. Experts stress that the single biggest thing that will defeat ransomware is having a regularly updated backup. That way, if you are beset by ransomware, you can restore your system while losing relatively little work.<\/p>\n<p><a href=\"http:\/\/www.bierdopje.com\/forum\/forum-games\/topic\/17309-Raad-de-serie-a-d-h-v--een-kenmerkend-logo-teken---Deel-15\/9\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-96757 \" title=\"Update your computer\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2z9jk7s-e1562344598563-150x150.jpg?resize=55%2C55&#038;ssl=1\" alt=\"\" width=\"55\" height=\"55\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2z9jk7s-e1562344598563.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2z9jk7s-e1562344598563.jpg?resize=75%2C75&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2z9jk7s-e1562344598563.jpg?w=567&amp;ssl=1 567w\" sizes=\"auto, (max-width: 55px) 100vw, 55px\" \/><\/a>3. <strong>Update your software<\/strong> regularly. Ransomware, like most malware threats, may sneak onto your PC through a known flaw in your operating system or other software programs. And hackers often rely on people running outdated software with those known vulnerabilities. You can definitely decrease the potential for ransomware if you make a practice of updating your software often.<\/p>\n<p>4. <strong>Use a reputable security suite<\/strong>. It is always a good idea to have both anti-malware software and a firewall to help you identify threats or suspicious behavior. Malware authors often send out new variants, to try to avoid detection, which is why it\u2019s important to have both layers of protection.<\/p>\n<p>Anti-malware vendor <a title=\"Webroot\" href=\"http:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Webroot<\/a> provided this infographic that shows the prevalence of ransomware and the methods IT professionals use to deal with it.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20160508225155\/http:\/\/www.webroot.com:80\/us\/en\/business\/resources\/infographics\/ransomware-threats-raise-concern\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-96764 size-full\" title=\"Webroot Ransomwear infographic\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-threats-raise-concern-among-it-pros.jpg?resize=480%2C2102&#038;ssl=1\" alt=\"Webroot Ransomwear infographic\" width=\"480\" height=\"2102\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-threats-raise-concern-among-it-pros.jpg?w=640&amp;ssl=1 640w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-threats-raise-concern-among-it-pros.jpg?resize=17%2C75&amp;ssl=1 17w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-threats-raise-concern-among-it-pros.jpg?resize=34%2C150&amp;ssl=1 34w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/ransomware-threats-raise-concern-among-it-pros.jpg?resize=234%2C1024&amp;ssl=1 234w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/a><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/securitywatch.pcmag.com\/mobile-security\/328909-mobile-threat-monday-the-rise-of-mobile-ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Threat Monday: The Rise of Mobile Ransomware<\/a> (securitywatch.pcmag.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a growing malware that locks your computer until you pay a fee take these steps to limit your chances of losing your files.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[2292,857,824,23,1507,4,1063],"class_list":["post-73254","post","type-post","status-publish","format-standard","hentry","category-security","tag-2292","tag-bitcoin","tag-encryption","tag-malware","tag-ransomware","tag-security","tag-webroot"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=73254"}],"version-history":[{"count":6,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73254\/revisions"}],"predecessor-version":[{"id":128338,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/73254\/revisions\/128338"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=73254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=73254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=73254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}