managed it services

Blog

Find relative content about managed IT services, cyberdefense and IT strategy here.

    Watch Out for All Different Kinds of Ransomware

    5 May, 2020
    0 Comments

    Ransomware has become infamous the past few years, primarily due to its involvement in a growing number of cyberattacks during this time. Of course, not all ransomware works in the same way, and recognizing the difference could prove to be useful. Therefore, we’ve taken a few moments and assembled a brief description of the four most common ransomware varieties.

    Download our free white paper,  CyberDefense: Securing Your Bank's Data.

    Scareware

    Scareware earns its name by relying on scare tactics to scare its victims. Often posing as some antivirus, a scareware program might warn the target that there are issues present on the device that require payment to resolve. Depending on who you ask, scareware isn’t always considered a form of ransomware, but the reliance on fear to coerce action from a victim is certainly a common thread between the two.

    Locker Ransomware

    This variety of ransomware effectively bars you from accessing a system, leaving the files untouched but preventing you from doing anything (except for paying the demanded ransom). In many ways, this is similar to the variety of ransomware that most will likely be familiar with - crypto-ransomware.

    Crypto Ransomware

    While locker ransomware prevents you from accessing your files by blocking you out of the system, crypto-ransomware goes so far as to encrypt the files themselves. Once you have lost access, you are given a deadline to pay up by, or your data will be permanently deleted. Short of restoring your systems from a backup, there is no real sure-fire way to recover from this. After all, there is no guarantee that the party responsible for infecting you will restore your access, even if you were to pay.

    Extortionware

    Also known as “doxware,” extortionware works in a very similar way to a crypto ransomware--once a system is infected, the files on it are encrypted, and the user is given the attacker’s demands. However, there is one key difference: rather than deleting files, extortionware threatens to share personal details out. This gives targets a much different, but no less effective, motivation to comply with the demands as mentioned above.

    What Can You Do?

    To protect your business from ransomware, you and your team need to keep the following best practices in mind:

    Backup your data - This acts as an insurance policy if a ransomware attack was to slip past your defenses.

    Keep your software updated - Many ransomware titles use exploits in your operating system to take root. Keeping your solutions patched and updated minimizes these weak points.

    Educate your team - Make sure that your team is well aware of what to look out for to identify ransomware, and that they know how to handle it when they do encounter some.

    Remember, ransomware is exploitative and so will take the low road to accomplish its objective. A very new locker ransomware, known as CovidLock, has recently been distributed to Android devices through a malicious coronavirus tracking application.

    CalTech is here to assist your business with its cybersecurity and other IT needs. Find out more about what we do by reading more of our blogs, exploring the rest of our website, or by calling us at 877-223-6401.

    Download our free white paper,  CyberDefense: Securing Your Bank's Data.

    RELATED NEWS

    Popular Posts