echo ''; Clamorworld » In everyday life every one of us comes across various experiences, incidents which we either don’t share with anyone or share with family members and friends. Print media, electronic media and various medium shows the news, but its ends up showing one sided of the story. We never come to know the other side of story. With so much happening every day, every second across our neighborhood, society, and world it’s difficult for the news media to cover all the news. Many times we have felt wish we could share our voice, opinion, thoughts with the world. Many a times we have felt the frustration, anger and helplessness for not being able to do anything about an incident. Have you ever felt, for a good cause, you need support, but don’t know how to garner the support and attention. So, now you have an option “www.Clamorworld.com“. This is a platform to share everything you want to. A website 100% runs by the people for the people. The world is waiting to listen to your voice, the voice which has kept you suppressed so far. If you do not want to share the incident, event personally, please send it to us at contact@clamorworld.com, and we will share it on your behalf and assure to keep your name confidential. Let’s make this world a peaceful and a happy place to live. » What is ransomware? Decoding the cyberattack that locked up 100,000 computers

What is ransomware? Decoding the cyberattack that locked up 100,000 computers

 

Computers across the world were locked up and users’ files held for ransom when dozens of countries were hit in a cyberattack that targeted hospitals, companies and government agencies.

Here’s a look at how malware and ransomware work and what people can do if they fall victim to attacks.

What is malware and ransomware?

Malware is a general term that refers to software that’s harmful to your computer, said John Villasenor, a professor at the University of California, Los Angeles.

Ransomware is a type of malware that essentially takes over a computer and prevents users from accessing data on it until a ransom is paid, he said.

How does your computer become infected with ransomware?

In most cases, the software infects computers through links or attachments in malicious messages known as phishing emails.

“The age-old advice is to never click on a link in an email,” said Jerome Segura, a senior malware intelligence researcher at Malwarebytes, a San Jose-based company that has released anti-ransomware software. “The idea is to try to trick the victim into running a malicious piece of code.”

The software usually is hidden within links or attachments in emails. Once the user clicks on the link or opens the document, their computer is infected and the software takes over.

How ransomware works?

“Ransomware, like the name suggests, is when your files are held for ransom,” said Peter Reiher, an adjunct professor at UCLA who specializes in computer science and cybersecurity. “It finds all of your files and encrypts them and then leaves you a message. If you want to decrypt them, you have to pay.”

The ransomware encrypts data on the computer using an encryption key that only the attacker knows. If the ransom isn’t paid, the data is often lost forever.

When the ransomware takes over a computer, the attackers are pretty explicit in their demands, Segura said. In most cases, they change the wallpaper of the computer and give specific instructions telling the user how to pay to recover their files. Most attackers demand between $300 and $500 to remove the malicious ransomware; the price can double if the amount isn’t paid within 24 hours.

Law enforcement officials have discouraged people from paying these ransoms.

How to avoid these ransomware attacks?

The first step is being cautious, experts say. But Villasenor said there is “no perfect solution” to the problem.

Users should regularly back up their data and ensure that security updates are installed on your computer as soon as they are released. Up-to-date backups make it possible to restore files without paying a ransom.

Friday’s attack exploited vulnerabilities in some versions of Microsoft Windows. Microsoft has released software patches for the security holes, although not everyone has installed those updates.

“If your software is not patched, you can exploit that user. Anyone who applied the patch that Microsoft released likely wasn’t affected by this,” Reiher said.

Users should also look for malicious email messages that often masquerade as emails from companies or people you regularly interact with online. It’s important to avoid clicking on links or opening attachments in those messages, since they could unleash malware, Villasenor said.

Leave a reply