{"id":108,"date":"2017-05-15T09:31:35","date_gmt":"2017-05-15T09:31:35","guid":{"rendered":"http:\/\/thejigsawseo.in\/blog\/?p=108"},"modified":"2017-11-03T10:05:18","modified_gmt":"2017-11-03T10:05:18","slug":"everything-about-ransomware-attack","status":"publish","type":"post","link":"http:\/\/thejigsawseo.in\/blog\/everything-about-ransomware-attack\/","title":{"rendered":"The WannaCry Ransomware attack has spread to 150 countries. You can be the next target."},"content":{"rendered":"<h2><strong>\u00a0<\/strong><strong>What is Ransomware Attack?<\/strong><\/h2>\n<ol>\n<li>Ransomware is a type of\u00a0malicious software\u00a0that carries out the cryptoviral extortion attack from\u00a0cryptovirology\u00a0that blocks access to data until a\u00a0ransom\u00a0is paid and\u00a0displays a message\u00a0requesting payment to unlock it.<\/li>\n<li>It is similar to the kidnapping, but in this case instead of your family members your data has been taken away from you and they ask for extortion money.<\/li>\n<li>Simple Ransomware may lock the system in a way which is not difficult for a knowledgeable person to reverse.<\/li>\n<li>More advanced malwareencrypts\u00a0the victim&#8217;s files, making them inaccessible, and demands a ransom payment to decrypt them.<\/li>\n<li>The Ransomware may also encrypt the computer&#8217;sMaster File Table\u00a0(MFT)\u00a0or the entire hard drive. Thus, Ransomware is a denial-of-access attack that prevents computer users from accessing files\u00a0since it is\u00a0intractable\u00a0to decrypt the files without the decryption<\/li>\n<\/ol>\n<h2><strong>Why Ransomware creators and distributors target common people like you?<\/strong><\/h2>\n<ol>\n<li>Because they don\u2019t have\u00a0data backups;<\/li>\n<li>Because they have little or no cyber security education, which means they\u2019ll click on almost anything;<\/li>\n<li>Because the same lack of online safety awareness makes them prone to manipulation by cyber attackers;<\/li>\n<li>Because they don\u2019t keep their software up to date.<\/li>\n<li>Because they often rely on luck to keep them safe online (I can\u2019t tell you how many times I\u2019ve heard \u201cit can\u2019t happen to me\u201d);<\/li>\n<li>Because most home users still rely exclusively on antivirus to protect them from all threats, which is frequently ineffective in spotting and stopping ransomware;<\/li>\n<li>Because of the sheer volume of Internet users that can become potential victims (more infected PCs = more money).<\/li>\n<\/ol>\n<h2><strong>\u00a0<\/strong><strong>How do Ransomware threats spread?<\/strong><\/h2>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-110\" src=\"http:\/\/thejigsawseo.in\/blog\/wp-content\/uploads\/2017\/05\/simple-ransomware-infection-chain-1.png\" alt=\"simple-ransomware-radiancevision\" width=\"777\" height=\"402\" srcset=\"http:\/\/thejigsawseo.in\/blog\/wp-content\/uploads\/2017\/05\/simple-ransomware-infection-chain-1.png 777w, http:\/\/thejigsawseo.in\/blog\/wp-content\/uploads\/2017\/05\/simple-ransomware-infection-chain-1-300x155.png 300w, http:\/\/thejigsawseo.in\/blog\/wp-content\/uploads\/2017\/05\/simple-ransomware-infection-chain-1-768x397.png 768w\" sizes=\"(max-width: 777px) 100vw, 777px\" \/><\/p>\n<ol>\n<li>Spam email campaignsthat contain malicious links or attachments (there are plenty of\u00a0forms that malware can use for disguise\u00a0on the web);<\/li>\n<li>Security exploits invulnerable software;<\/li>\n<li>Internet traffic redirects to malicious websites;<\/li>\n<li>Legitimate websites that havemalicious code injected\u00a0in their web pages;<\/li>\n<li>Drive-by downloads;<\/li>\n<li>Malvertising campaigns;<\/li>\n<li>SMS messages (which apply to ransomware that targets mobile devices);<\/li>\n<li>Botnets;<\/li>\n<li>Self-propagation (spreading from one infected computer to another);<\/li>\n<li>Affiliate schemes in ransomware-as-a-service (earning a share of the profits by helping further spread ransomware).<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How can you avoid and bounce from a Ransomware attack?<\/strong><\/h2>\n<ol>\n<li>Keep your Windows Operating System and antivirusup-to-date. \u00a0Upgrade to\u00a0Windows 10.<\/li>\n<li>Regularly back-up your files in an external hard-drive.<\/li>\n<li>Enable file history or system protection. In your Windows 10 or Windows 8.1 devices, you must have your file history enabled and you have to\u00a0setup a drive for file history.<\/li>\n<li>Use OneDrive for Consumer or for Business.<\/li>\n<li>Beware of\u00a0phishing emails, spams, and clicking malicious attachment.<\/li>\n<li>Use Microsoft Edge to get SmartScreen protection. It will prevent you from browsing sites that are known to be hosting exploits, and protect you from socially-engineered attacks such as phishing and malware downloads.<\/li>\n<li>Disable the loading of macros in your Office programs.<\/li>\n<li>Disable your Remote Desktop feature whenever possible.<\/li>\n<li>Use two factor authentication.<\/li>\n<li>Use a safe and password-protected internet connection.<\/li>\n<li>Avoid browsing web sites that are known for being malware breeding grounds (illegal download sites, porn sites, etc.).<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0What is Ransomware Attack? Ransomware is a type of\u00a0malicious software\u00a0that carries out the cryptoviral extortion attack from\u00a0cryptovirology\u00a0that blocks access to data until a\u00a0ransom\u00a0is paid and\u00a0displays a message\u00a0requesting payment to unlock it. It is similar to the kidnapping, but in this case instead of your family members your data has been taken away from you and&#8230;<\/p>\n","protected":false},"author":1,"featured_media":109,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[2],"tags":[66,65,68,64,67],"_links":{"self":[{"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/posts\/108"}],"collection":[{"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/comments?post=108"}],"version-history":[{"count":3,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/posts\/108\/revisions"}],"predecessor-version":[{"id":287,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/posts\/108\/revisions\/287"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/media\/109"}],"wp:attachment":[{"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/media?parent=108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/categories?post=108"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/thejigsawseo.in\/blog\/wp-json\/wp\/v2\/tags?post=108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}