What is ‘Ransomware’? How to Secure your System from Ransomware.?
Subscribe me on Youtube
In simple words–Ransomware is the malicious software,which can enter in any system through internet browsing, ads on webpages, and the invite links on social media.Ransomwares are blocks your access in your system.
In a properly implemented cryptoviral extortion attack, recovering the files without the decryption key is an intractable problem – and difficult to trace digital currencies such as Ukash and Bitcoin are used for the ransoms, making tracing and prosecuting the perpetrators difficult.
ALSO Read–What is UI.?Types of UI..?
Rise Of Ransomware…
The concept of file encrypting ransomware was invented and implemented by Young and Yung at Columbia University and was presented at the 1996 IEEE Security & Privacy conference.Starting from around 2012 the use of ransomware scams has grown internationally.
In June 2013, security software vendor McAfee released data showing that it had collected more than double the number of samples of ransomware that quarter than it had in the same quarter of the previous year.(Here I define the history of Ransomware in Short.)
The concept of file encrypting ransomware is called cryptoviral extortion and it was inspired by the fictional facehugger in the movie Alien.
The process of file encrypting By Ransomware is know as “CRYPTOVIRAL”. Cryptoviral extortion is three- round protocol carried out between the attacker and the victim.
The Three round Protocol is Below—
1.- [attacker→victim] The attacker generates a key pair and places the corresponding public key in the malware. The malware is released.
2.- [victim→attacker] To carry out the cryptoviral extortion attack, the malware generates a random symmetric key and encrypts the victim’s data with it. It uses the public key in the malware to encrypt the symmetric key. This is known as hybrid encryption and it results in a small asymmetric ciphertext as well as the symmetric ciphertext of the victim’s data. It zeroizes the symmetric key and the original plaintext data to prevent recovery. It puts up a message to the user that includes the asymmetric ciphertext and how to pay the ransom. The victim sends the asymmetric ciphertext and e-money to the attacker.
3.- [attacker→victim] The attacker receives the payment, deciphers the asymmetric ciphertext with the attacker’s private key, and sends the symmetric key to the victim. The victim deciphers the encrypted data with the needed symmetric key thereby completing the cryptovirology attack.
The symmetric key is randomly generated and will not assist other victims. At no point is the attacker’s private key exposed to victims and the victim need only send a very small ciphertext (the encrypted symmetric-cipher key) to the attacker. Ransomware attacks are typically carried out using a Trojan, entering a system through, for example, a downloaded file or a vulnerability in a network service. The program then runs a payload, which locks the system in some fashion, or claims to lock the system but does not (e.g., a scareware program).
History of Ransomware…
1.-Encrypting ransomware
The first known malware extortion attack, the “AIDS Trojan” written by Joseph Popp in 1989, had a design failure so severe it was not necessary to pay the extortionist at all. Its payload hid the files on the hard drive and encrypted only their names, and displayed a message claiming that the user’s license to use a certain piece of software had expired.
2.-Non-encrypting ransomware
In August 2010, Russian authorities arrested nine individuals connected to a ransomware Trojan known as WinLock. Unlike the previous Gpcode Trojan, WinLock did not use encryption. Instead, WinLock trivially restricted access to the system by displaying pornographic images, and asked users to send a premium-rate SMS (costing around US$10) to receive a code that could be used to unlock their machines.
3.- Leakware
It is also called ‘Doxware’.The converse of ransomware is a cryptovirology attack that threatens to publish stolen information from the victim’s computer system rather than deny the victim access to it.
4.- Mobile ransomware
With the increased popularity of ransomware on PC platforms, ransomware targeting mobile operating systems has also proliferated. Typically, mobile ransomware payloads are blockers, as there is little incentive to encrypt data since it can be easily restored via online synchronization.
Click Here…To Follow me
Examples of Ransomware…
1.-Reveton(2012)
2.-CryptoLocker(2013)
3.-CryptoLocker.F and TorrentLocker(2014)
4.-CryptoWall(2014)
5.-Fusob(2015-2016)
6.-Petya(2016)
7.-WannaCrypt(2017)
8.-Mitigation
The defination of Ransomwares is not updated in antivirus softwares,So it is can not find by Antivirus.
Extension of Ransomware files– I found Some extension of Ransomware file which is below..
.ecc, .ezz, .exx, .zzz, .xyz, .aaa, .abc, .ccc, .vvv, .xxx, .ttt, .micro, .encrypted, .locked, .crypto, _crypt, .crinf, .r5a, .XRNT, .XTBL, .crypt, .R16M01D05, .pzdc, .good, .LOL!, .OMG!, .RDM, .RRK, .encryptedRSA, .crjoker, .EnCiPhErEd, .LeChiffre, .keybtc@inbox_com, .0x0, .bleep, .1999, .vault, .HA3, .toxcrypt, .magic, .SUPERCRYPT, .CTBL, .CTB2, .locky or 6-7 length extension consisting of random characters.
The most important thing that “How to protect Yourself from Ransomwares.?”.
If you are getting invite link do not click on it and also do not click on ads.
Also Visit–Cyber Tech & Tricks
Thanks For Visit
