Share this
Ransomware is a tool that is increasingly being used by cybercriminals to block individuals and organizations from accessing their critical business and personal data to extort ransoms. The ransomware in itself is a form of malware that encrypts data in a victims computer. The attacker then demands payment from the victim to restore access to the computer or data upon payment.
Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver mission-critical services. Malicious actors have adjusted their ransomware tactics over time to include pressuring victims for payment by threatening to release stolen data if they refuse to pay and publicly naming and shaming victims as secondary forms of extortion.
Victims are usually shown instructions for how to pay the fee to get the decryption key. The costs can range from a few thousand shillings to millions, payable to cybercriminals in cryptocurrencies.
How does ransomware work?
Ransomware attacks work by gaining access to your computer or device and then locking and encrypting the data stored on it. How does this happen? It often happens when victims mistakenly download malware through email attachments or links from unknown sources — which happen to be hackers.
Ransomware prevents you from accessing the files stored on your computer. Just like kidnappers in the physical world, this malicious software essentially holds your files hostage, which can wreak havoc on an extremely broad scale for larger organizations.
There are several things the malware might do once it’s taken over the victim’s computer, but the most important thing to know is that at the end of the process, the files cannot be decrypted without a mathematical key known only by the attacker.
While a ransom is demanded, there’s no guarantee your data will be restored if you pay that ransom. This makes ransomware tricky to navigate.
Types of ransomware
Ransomware attacks can be deployed in different forms. Some variants may be more harmful than others, but they all have one thing in common: a ransom demand.
Here are seven common types of ransomware.
1. Crypto malware
This form of ransomware can cause a lot of damage because it encrypts things like your files, folders, and hard drives.
One of the most familiar examples is the destructive 2017 WannaCry ransomware attack. It targeted thousands of computer systems around the world that were running Windows OS and spread itself within corporate networks globally. Victims were asked to pay ransom in cryptocurrency to retrieve their data.
2. Lockers
Locker-ransomware is known for infecting your operating system to completely lock you out of your computer or devices, making it impossible to access any of your files or applications.
This type of ransomware is most often Android-based.
3. Ransomware on mobile devices
Ransomware began infiltrating mobile devices on a larger scale in 2014. What happens? Mobile ransomware often is delivered via a malicious app, which leaves a message on your device that says it has been locked due to illegal activity.
How to protect yourself from ransomware
There are steps you can take to help protect your computer and devices against being infiltrated by ransomware. Here’s a list of tips to remember.
- Always back up your data. If you’ve made an external backup of your files, then you should still have access to your data if cybercriminals try to steal and hold it hostage.
- Install reliable anti-virus software with ransomware protection.
- Stay updated. Keep your operating system, programs, and security software up to date. This helps to protect you against the latest malware with the latest security patches.
- Never click on email attachments or links from unknown sources. They could have malware embedded in them.
- Be cautious when online. Malicious websites and pop-up ads are just waiting for you to click on them.
- Don’t surf the web on public Wi-Fi networks. If you have to use the internet in a public place, tether your phone instead. If that is not possible, using a VPN (virtual private network) application can help keep your data private.
- Never use USB sticks from unknown sources. You don’t want to provide an easy gateway for hackers.
NB: A single infected computer can compromise an entire institution’s network.
Cover Photo by Michael Geiger on Unsplash