Decoding New Cyber Threat Ransomware

Heard about the resent cyber-attacks that are making headlines?

Here’s a look at how malware and ransomware work and what people can do if they fall victim to attacks.

Computers across the world were locked up and users were unable to open their files unless they paid a ransom. when dozens of countries were hit in a cyberattack that targeted hospitals,companies and government agencies.

cyber ransomware attack                                            Image:

Difference between malware and ransomware

Malware is a general term for a software that’s harmful to your computer which is also known as Virus. Ransomware is a type of virus that will take over a computer and prevents users from accessing data on it until a ransom amount is paid.

How your computer gets infected with ransomware?

In most cases, the software usually is hidden within links or attachments in emails. Once the user clicks on the link or opens the document, their computer gets infected and the software takes over.

This is how ransomware works

Like the name says Ransomware is when your files are held for a ransom amount. It finds all of your files and lock them up and then leaves you a message. If you want to unlock them, you have to pay.The ransomware encrypts data on the computer using an encryption key that only the attacker knows.

ramsomware cyber attack                                            Image:

If the ransom isn’t paid, the data is often lost forever. When the ransomware takes over a computer, the attackers are pretty explicit in their demands. In most cases, they change the wallpaper of the computer and give specific instructions telling the user how to pay to recover their files and to remove the malicious ransomware; the price can double if the amount isn’t paid within a given time. Law enforcement officials have discouraged people from paying these ransoms.

This way you might avoid Ransomware attacks

Experts say the first step is being cautious But Villasenor said there is “no perfect solution” to the problem. Users should regularly back up their data and ensure that security updates are installed on your computer as soon as they are released. Up-to- date backups make it possible to restore files without paying a ransom.

Friday’s attack exploited vulnerabilities in some versions of Microsoft Windows. Microsoft has released software updates for the security holes but not everyone has installed those updates. Users should also look out for malicious emails that often looks as emails from companies or people you regularly interact with online. It’s important to avoid clicking on links or opening attachments in those messages, since they could unleash malware.

No Comments Yet

Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>