Left Menu
Development News Edition

Kaspersky talks about different types of ransomware and free ransomware protection, decryption tools

With the recent few intense cyber-attacks taking place globally it is a good practice to understand how these cyberattacks work and how can they be prevented. Kaspersky talks about different types of Ransomware and how to protect yourself from ransomware and how to mitigate any damage that's already done.

ANI | New Delhi | Updated: 16-02-2020 17:02 IST | Created: 16-02-2020 17:02 IST
Kaspersky talks about different types of ransomware and free ransomware protection, decryption tools
Representative Image . Image Credit: ANI

With the recent few intense cyber-attacks taking place globally it is a good practice to understand how these cyberattacks work and how can they be prevented. Kaspersky talks about different types of Ransomware and how to protect yourself from ransomware and how to mitigate any damage that's already done. Ransomware is malicious software that uses a variety of methods to get onto devices, then encrypts some or all of the files they contain and demands a payment to restore access to your valuable data.

The software can infect your computer if you, say, plug an unfamiliar USB stick into your computer, visit a malicious site, or download and run a malicious file from the Web or an e-mail attachment. Even being on the same network as an infected computer, and doing nothing wrong, maybe enough to get infected with ransomware. One type even looks like a Windows update. The ransom request specifies payment in bitcoin (or another cryptocurrency), which makes it very difficult or even impossible to trace the payment.

The malefactors say they will return your files if you pay the ransom. But in reality, your ransom payment is no guarantee of a safe return for your files. According to Kaspersky's research, 20 per cent of ransomware victims who paid did not get their files back.

The average demand is about USD 300. A careful consideration rather than a hasty payment is recommended. Cybercriminals prefer bitcoins. This cryptocurrency cannot be forged. The history of transactions is available to anyone, but the owner of the wallet can't easily be tracked.

The most suspicious files are executables (like .exe or .scr), with Visual Basic scripts or JavaScript (.vbs and .js) not far behind. Another dangerous file category is Microsoft Office files (.doc, .docx, .xls, .xlsx, .ppt, and so forth). They may contain vulnerable macros. Macs can be and have been infected with ransomware. There are not as many ransomware programs for macOS as for Windows at the moment, but we are sure the number will increase in the coming years.

CryptMix ransomware tells victims their "donations" will go to a children's charity. Petya and Misha are both ransomware, and they are delivered to victims together, in one package. Petya and Misha are distributed by means of phishing letters pretending to be job applications.

WannaCry Ransomware takes your data hostage, promising to return it if you pay a ransom. WannaCry targets computers using Microsoft Windows as an operating system. It encrypts data and demands payment of a ransom in the cryptocurrency Bitcoin for its return. A new version of Shade ransomware adds ".no_more_ransom" to the end of each encrypted file.

Ransomware recovery is a mixed bag, and avoiding infection is the best path in every way. Do not download suspicious files, click suspicious links or open e-mail attachments that are unexpected or from unknown senders. Back up your files frequently as well. That way, even if ransomware locks or blocks your files, you can recover them without paying a ransom.

The free Kaspersky Security Cloud -- Free protects personal devices not only from ransomware, but from a huge range of other threats, and Kaspersky Anti-Ransomware Tool for Business, which is also free, can be installed alongside other security solutions and does not conflict with them. (ANI)

(This story has not been edited by Devdiscourse staff and is auto-generated from a syndicated feed.)

Download The Devdiscourse News App for Latest News.


TRENDING

OPINION / BLOG / INTERVIEW

'Diya jalao' for COVID 19: Modi needs to practice his teachings and control fake news on social media

In his video message to the nation on Friday the Prime Minister talks about peoples collective power to win the invincible. However, he has made no concreate efforts to win over the confidence and represent the collective power of the polit...

Tourism post-COVID 19: Lessons learned, out-of-box strategies to ensure the revival

In the pre-COVID 19 period the tourism industry was seen with much hope throughout the world. However, the COVID 19 pandemic has completely paralysed the tourism industry and its dependent sectors. The tourism industry in the post-COVID 19 ...

Cybersecurity post-COVID 19: More internet means more threats, stay alert folks!

When supported by adequate digital awareness campaigns and more crackdowns on cybercrimes, increased internet usage will help more people embrace technology and better understand the risks, bringing us closer to unleashing the true potentia...

Rising temperatures in India seem to counter the spread of COVID 19 infections

Scary predictions on the rate of spread of COVID 19 infections in India are floating in media. But the data on the spread of infections coming so far point to a contrary trajectory putting a question mark on such predictions. Explanations o...

Videos

Latest News

U.S. Supreme Court postpones April oral arguments

The U.S. Supreme Court has postponed oral arguments scheduled for April as a result of the coronavirus outbreak, a spokeswoman said on Friday.The court, which had already delayed cases due to be argued in March, has not yet said how it plan...

J&K govt extends 2G mobile internet services till April 15

The Jammu and Kashmir administration on Friday ordered the continuance of 2G mobile data services in the Union territory till April 15, even as the demand for restoration of high-speed 4G internet grows in view of the coronavirus outbreak. ...

Report: Bulls open search for top executive

Chicago Bulls president and chief operating officer Michael Reinsdorf appears to be responding to a growing chorus of fans and critics and will hire a new executive to oversee basketball operations. The successful candidate will have full a...

WHO opens door to broader use of masks to limit spread of coronavirus

The World Health Organization on Friday said it still believed the use of respirator masks should be focused mainly on medical workers, but opened the door to greater use of homemade masks or other mouth coverings as a way to reduce the spr...

Give Feedback