Login

Member Login  |   Member PortalJoin Email List  |   Events  |   BLOG  |   VLOG

What you need to know about ransom-ware

Ransomware has on several occasions been termed the next biggest threat to internet security confronting the cybersafe communication systems. The fact that there is no sure way of preventing shielding oneself from this threat makes it difficult to bear. This news implies that every internet user, ranging from computer and smartphone to smart TV users, no one can claim immunity to this continually escalating menace.

However, knowing how these criminals take your businesses data hostage, their demands, the different types of malware they deploy and how to respond to either may help you minimize chances of falling victim. In other instances, such knowledge may help you know how to react to the hacker’s threats as well as limit the extent of your loss.

Here is everything you need to know about such an attack perpetrated against your business.

How does it work?

In most cases, it starts with the attacker spamming your emails or browser with contaminated links usually disguised as something else. Opening such emails or clicking on the said links initiates the installation process of the attacker’s virus or warm. The virus then encrypts your businesses critical files and data with some advanced viruses that tear your cybersafe veil and attack connected backups.

Upon successful encryption of your data, your attacker might contact you demanding ransom for your data that they usually prefer to be paid in the form of untraceable payment processes such as cryptocurrencies or western union.

Type of ransom ware

According to reports by Kaspersky Labs, there are primarily two types of ransom malware; Locker and Crypto.

Locker programs

These avoid the complicated encryption process and specialize in locking the user out of specific files or computer functions. The most popular often locked individuals out the desktop as well as blocking their internet access. Considering their limited intrusiveness, locker programs are easier to defeat.

Crypto malware

These are complex programs that install on your computer and corrupt, by way of encryption, some of your most sensitive data. Initially, these programs only targeted photos and contact details on your pc hard drive. However, with advancement in technology, this malware can now trace executable files on your computer and encrypt them until you pay for decryption.

Some malware like Chimera even threaten to publish the encrypted details online should you fail to meet their ransom demands. Others like the offline ransomware have devised methods of executing their encryption offline. Implying that they can still run commands on your disconnected devices where you store your backups.

Should you pay or not pay?

When faced with the threat of a cyber-criminal attacking confidentiality of a business and threatening to publish the organization's contacts and contracts online, most people will go to any length to pay the attackers off. However, how sure are you that the attacker will furnish you with a decryption key or will they manipulate your resourcefulness and demand for more?

Studies on some of this malware such as Chimera indicates they are fundamentally flawed and can't steal data from your computer let alone publish them online. Others like the Power Worm have a defective encryption process that renders whatever decryption key they offer you useless. Therefore, whether you pay or not, you still lose your data.

Therefore, when faced with such a challenge, the best course of action before contemplating pay would remain to inform relevant authorities such as the FBI. Their specialists would then advise on whether to pay or not based on the sensitivity of your business information and chances of recovery.

How to avoid becoming malware program victim?

The most cybersafe method of preventing random malware slipping into your computer system and encrypting your data is abstinence from accessing the internet. However, since this is impractical, you are advised to avoid accessing sensitive business sites outside a secure network such as over hotel and airport Wi-Fi.

Additionally, always confirm that these free hotel and airport Wi-Fi networks are cybersafe and legitimate before using them. It is also advisable that you stop opening suspicious e-mails and links.

Most importantly, ensure you constantly back up your business information in an unconnected device. A backup shields you from the irreparable losses should the ransomware menace catch up with you and for one reason or another fail to raise the ransom or lose the data.

Bottom line

No one knows if they will ever encounter a cyber-attack to their business. However, given its rapid spread across the world, it would only pay to know how to avoid falling prey to its fangs.

Reference links:
https://usa.kaspersky.com/resource-center/threats/ransomware-threats-an-in-depth-guide
https://www.entrepreneur.com/article/286431
https://www.stormwindstudios.com/3-critical-steps-to-stop-ransomware-like-wannacry-and-petya-today/

 Sign up to get advice from an HR Pro!

Looking to make your Company CyberAWARE?
Get hooked into Corporate Training!

Add a comment

*Please complete all fields correctly

Related Blogs

16 Nov 2017
Q&A: How do I keep an employee at-will but require them to give notice before leaving?
Question: How do I keep an employee-at-will but require them to give notice before leaving? Answer from Monica, SPHR, SHRM-CP: Unfortunately, an employer may not simultaneously utilize the at-will employment...
08 Nov 2017
Q&A: We interviewed a candidate who ... spoke with a thick accent. Is it okay to reject a candidate because their accent made it difficult to understand them?
Question: We interviewed a candidate who had the right type and length of experience but spoke with a thick accent. Is it okay to reject a candidate because their accent...
01 Nov 2017
Q&A: Do we need a company policy related to service animals in the workplace?
Question: Do we need a company policy related to service animals in the workplace? What if someone asks to bring one in? Answer from Emily, PHR: You do not need...