{"id":83245,"date":"2016-08-05T17:52:53","date_gmt":"2016-08-05T12:22:53","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=83245"},"modified":"2016-08-08T12:57:39","modified_gmt":"2016-08-08T07:27:39","slug":"7-important-ransomware-faqs-that-you-must-know","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/7-important-ransomware-faqs-that-you-must-know\/","title":{"rendered":"7 Important Ransomware FAQs that you must know"},"content":{"rendered":"<p>There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike.<\/p>\n<p>Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then demands a ransom from the victim to let go off the system or decrypt the files.<\/p>\n<p>The threat of ransomware has been steadily growing over the past few years, with attackers bringing in more sophistication into their attacks. We have outlined 8 important ransomware FAQs for you to know and understand so that you can be more prepared.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">1. How old is ransomware?<\/span><\/strong><\/h3>\n<p>Many might suppose that this nefarious malware is relatively new. But, its history can be traced back to 1989. AIDS Trojan is known to be the first ransomware virus; it was created to target the attendees of a World Health Organization\u2019s international conference on AIDS. Although this malware was not technologically advanced and taken down without much effort, it became the forbearer of all the ransomware families that followed. They include:<\/p>\n<table width=\"409\">\n<tbody>\n<tr>\n<td width=\"215\"><strong>Ransomware<\/strong><\/td>\n<td width=\"195\"><strong>Time of occurrence<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Archiveus<\/td>\n<td width=\"195\">2006<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Unnamed<\/td>\n<td width=\"195\">2011<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Reveton<\/td>\n<td width=\"195\">2012<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Cryptolocker<\/td>\n<td width=\"195\">2013<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Cryptodefense<\/td>\n<td width=\"195\">2014<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Sypeng and Koler<\/td>\n<td width=\"195\">2014<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">CTB-Locker and SimplLocker<\/td>\n<td width=\"195\">2014<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">LockerPin<\/td>\n<td width=\"195\">2015<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">TeslaCrypt<\/td>\n<td width=\"195\">2015<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">LowLevel04 and Chimera<\/td>\n<td width=\"195\">2015<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Ransom32 and 7ev3n<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Locky<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">SamSam<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">KeRanger<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Petya<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Maktub<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Jigsaw<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">CryptXXX<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<tr>\n<td width=\"215\">Zcryptor<\/td>\n<td width=\"195\">2016<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><strong><span style=\"color: #006bb2;\">2. What are the types of ransomware?<\/span><\/strong><\/h3>\n<p>There are two primary variants of the ransomware malware.<\/p>\n<p><strong>1. File Encrypting Ransomware<\/strong> &#8211; encrypts the data (all types of files including pictures, word docs, spreadsheets, PDFs, videos, etc.) it can find in the computer that it infects.<\/p>\n<p><strong>2. Screen Locker Ransomware<\/strong> &#8211; Locks the screen of the infected computer and renders it useless.<\/p>\n<p>Incidences of file-encrypting ransomware are more common than screen lockers. This could be because attackers want their victims to use their computer in order to pay computer their encrypted data.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">3. How does a ransomware spread?<\/span><\/strong><\/h3>\n<p>\u2022 The most common medium used by attackers to spread ransomware is email. Victims are sent fake and devious emails loaded with attachments that contain ransomware malware.<\/p>\n<p>\u2022 Visiting compromised and infected websites can infect the user\u2019s system with a ransomware.<\/p>\n<p>When a computer is infected by a ransomware, nothing extraordinary happens that can alert the user of the incident. It is when the ransomware displays its ransom note (demanding a certain sum of money) that the user realizes that something is wrong.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">4. Are ransomware creators picky about their victims?<\/span><\/strong><\/h3>\n<p>The one universal truth about cyber is that they are not biased. Anyone who uses a computer and is connected to the Internet is a potential victim. And this could be a blogger sitting in a restaurant accessing the free Wi-Fi and working on a blog or a big retail organization.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">5. Why is ransomware a difficult malware to deal with?<\/span><\/strong><\/h3>\n<p>The main reason that makes ransomware a hard nut to crack is the technology they use to encrypt files. Primitive ransomware families used an encryption method which was relatively easy to break. The modern day\u2019s ransomware, however, uses a more complex method to encrypt the victim\u2019s files. Here, criminals have two things &#8211; a public key for encrypting the files and a private key for decrypting the files. It is the private key that a victim needs to buy in order to decrypt the files. Without this key, the decryption is impossible.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">6. Should you pay the ransomware\u2019s ransom?<\/span><\/strong><\/h3>\n<p>While the answer is easier said than done, it is strongly recommended never to pay the ransom. Paying extortionists only encourages them. Secondly, it is never guaranteed that you will get back your files even after you have met the ransomware\u2019s demands; after all, you are dealing with crooks with zero morale.<\/p>\n<h3><strong><span style=\"color: #006bb2;\">7. What should you do to stay away from ransomware?<\/span><\/strong><\/h3>\n<p>Because it is impossible to decrypt any files without the private key, preventing a ransomware infection is critical. Below are some simple security measures that reduce the risk of ransomware attacks to a great extent.<\/p>\n<ul>\n<li>Never open emails sent by unknown, unwanted or unexpected sources.<\/li>\n<li>If an email seems to have been sent by someone you know and carries a sense of urgency, call up the sender and verify. Most phishing emails are made to sound important or urgent. The way they are written is mainly to trick you into taking an action like clicking on a link or downloading an attachment.<\/li>\n<li>Do not click on links or download attachments in emails that ask for your personal information, or talk about your bank accounts.<\/li>\n<li>Apply all recommended security updates for your Operating System, programs like Adobe, Java, Internet Browsers, etc. These updates fix security weaknesses in these programs and prevent malware from exploiting them.<\/li>\n<li>Make sure that your antivirus software is up-to-date and blocks phishing emails and phishing websites.<\/li>\n<li>Take regular backups of your files. Remember to disconnect the Internet when you are backing up on a hard drive. Unplug the drive before you go online again.<\/li>\n<li>Install an <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-total-security\" target=\"_blank\">antivirus<\/a> that can prevent ransomware from infecting your computer. This <a href=\"https:\/\/blogs.quickheal.com\/infographic-how-quick-heal-helps-you-fight-the-ransomware-menace\/\" target=\"_blank\">infographic<\/a> shows what Quick Heal does to stop this malware.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"color: #666666;\">Source<\/span><br \/>\n<span style=\"color: #666666;\">https:\/\/www.csoonline.com\/article\/3095956\/data-breach\/the-history-of-ransomware.html#slide22<\/span><br \/>\n<span style=\"color: #666666;\">https:\/\/www.darkreading.com\/endpoint\/a-brief-history-of-ransomware\/d\/d-id\/1325212<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There can be no two way to the fact that Ransomware has easily become one of the biggest banes of digital security for individual users and enterprises alike. Ransomware is a malware that locks an infected computer or encrypts its files (converts the files into an unreadable form). It then demands a ransom from the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":83255,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,910,5],"tags":[1345,50],"class_list":["post-83245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-ransomware","category-security","tag-file-encryption","tag-ransomware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83245"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=83245"}],"version-history":[{"count":8,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83245\/revisions"}],"predecessor-version":[{"id":83262,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/83245\/revisions\/83262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/83255"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=83245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=83245"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=83245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}