Finding ransomware... Today, ransomware has become one of the most important threats faced by enterprises. A large amount of valuable data is locked by it, and the ransom paid for it is also very considerable. Cyphort has summarized a series of ransomware behavior characteristics, hoping to help everyone take the initiative in the fight against ransomware.
Jigsaw Deleting files regularly creates a sense of urgency to urge victims to pay the ransom faster. Jigsaw ransomware deletes an encrypted file on the computer for every hour that the victim's ransom is not received - even if the ransom is paid later, it cannot be recovered. In addition, Jigsaw will delete an additional 1,000 files every time the victim restarts the computer and logs into Windows.
Petya To encrypt the entire drive, Petya ransomware directly encrypts the Master File Table, which contains information about the allocation of files and folders.
RansomWeb, Kimcilware Encrypting Web server data. RansomWeb and Kimcilware ransomware families both adopted this unusual method of wreaking havoc, namely, based on Web servers rather than client computers. They infect and encrypt website databases, Web servers and hosted files, and demand that website administrators pay them a ransom.
DMA Locker, Locky, Cerber and CryptoFortress Encrypts data on network drives - even unmapped drives. DMA Locker, Locky, Cerber, and CryptoFortress all walk through all open network Server Message Block (SMB) shares and encrypt any information they find.
Maktub Maktub ransomware compresses files first to increase encryption speed.
The cloud environment is not safe either Delete or overwrite all cloud backups. In the past, it was often safer to back up data to cloud storage and file sharing platforms. However, various new types of ransomware have begun to extend their claws to shared file systems.
SimpleLocker For non-Win platforms, SimpleLocker can encrypt files on Android and Linux systems, while Encode.1 targets Linux, and KeRanger specifically attacks OS X.
Cerber Use the computer speaker to deliver voice messages to the victim. Cerber ransomware generates a VBScript titled "#DECRYPT MY FILES#.vbs" that allows the computer to play random messages to the victim. It can only read English at present, but the decryption website it uses provides 12 language versions. The content it plays includes "Attention! Attention! Attention!" and "Your files, pictures, databases and other important files have been encrypted!"
Tox Ransomware as a service has become a new form of profit in underground forums. It can provide malicious code and infrastructure, urge ransom payments and provide decryption keys to victims. Tox ransomware is a prominent representative in this regard. Original link: The despicable methods that ransomware uses to fool us [Translated by 51CTO. Please indicate the original translator and source as 51CTO.com when reprinting on partner sites] |
<<: IoT devices will surpass smartphones in 2018
>>: Why hasn’t the fourth pole of China’s Internet emerged besides BAT?
Not long ago, the team led by Professor Yu Li fro...
This article mainly interprets the new trends of ...
As online marketing becomes more mobile, traffic ...
We all have data packages for our mobile phones. ...
SEO optimization is a boring job. Generally, a ne...
Recently, my family group has been flooded with a...
Ctrl+G / Ctrl+Alt+Shift+G: Query where a variable...
High heels shame, diamond ring shame, makeup sham...
Welcome to the 22nd issue of the Nature Trumpet c...
I believe many of you have had this experience: y...
How to divert Douyin fans to WeChat? This article...
It is now the first month of the lunar calendar i...
"Everything will run in the cloud." Now...
51CTO Network+ Platform launched the "TechNe...
Source: Dr. Curious The cover image and the image...