Programs-extortionists: how to avoid becoming a victim of cybercrime
Technologies / / December 19, 2019
Experts predict that in the near future, the most serious threat to users will be the program-extortionists. With their help, cybercriminals can earn this year to $ 5 billion.
What is software-extortionists and how they work
The study, which identified major cyber threats in 2017, Acronis held company engaged in the protection and storage in hybrid clouds.
The majority of respondents admitted that they have not heard anything about ransomware programs, but they believe their personal data (documents, photos, videos, music) is very valuable. Their recovery from attacks like malicious software can cost a decent amount - more than $ 500.
They also found that over a quarter of respondents have never made backups. And more than 34% said that they have already lost personal data.
Programs-extortionists just work. They fall on the device (eg, via email) and encrypt user data. After that hackers are demanding a ransom.
For an attack not only big companies or government agencies, but also ordinary people, because they, too, are willing to pay.
That's just one example of the program-extortionist called Osiris. This Trojan is easily bypasses Windows Defender, attacking backup data and refuses to run in a virtual environment.
Earlier this year, Osiris has infected computers of the Police Department of the American city Cockrell Hill. As a result, the data were lost criminal cases (proofs, photos, videos) for the last eight years. The defense was unable to prevent the irretrievable loss of information.
What awaits us in the near future?
- Epidemic programs extortionists will grow exponentially. In 2016, hackers have earned with them about $ 1 billion, this amount may be increased by five times in 2017.
- Will increase the number of "strains" of malware.
- Increase the number of distributors of software-extortionists. One of the principles of the virus - copying the model of SaaS (software as a service), what attracts a huge number of small distributors. Their sole purpose - to infect targeted computers. To do this, do not need any special technical knowledge. Enough to have a computer and be prepared to break the law.
- Technology dissemination programs extortionists will be even trickier. At the end of 2016 was found out one of the most innovative to date dissemination schemes. They promised to give the user a free decryption key, if the malware will infect two others. It is assumed that this idea was taken from a famous horror film "The Ring."
- The most common type of attack will remain different schemes phishing scams. But they will be even more personalized and effective. Instead blockers programs-extortionists are often applied shifrovateli.
- There will be new methods of pressure on the victims. Technology can increase the size of the ransom and delete files every hour, while the user does not pay. According to forecasts, ransomware program will threaten the distribution and publication of confidential and compromising the data, if the victim did not immediately pay the ransom.
- Fewer security software providers will offer free decoders. programs extortionists, developers will learn to use the most reliable encryption scheme.
- New versions of malware will be able to work in the clouds and start to attack, including cloud-based storage. The users will have to look for cloud providers, who will be able to protect their data from such attacks.
What to do?
Rules are still simple:
- Back up your data. Choose a backup software with local and cloud storage, and active protection programs-extortionists.
- Regularly update operating system and software. This way, you will not suffer from known vulnerabilities.
- Do not read, delete suspicious emails, links and applications. Malicious software enters the system, when a user opens an infected an attachment or click on a link to a malicious site.
- Install anti-virus software on your computer, turn on automatic updates.