Lab 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 5

Ransomware

Ransomware is a type of malicious software designed to block access to computer


system until a sum of money is paid. Phising and spear phising is used to spread the
malware in the company. Ransomware can be spread through the advertising.
The list of different types of Ransomwares are listed below:
 Kill Disk: Kill Disk refers to the disk-wiping malware. Kill Disk were created by
the cybercriminal group called Telebots gang. Kill Disk has two version. The
old version used to erase important data from the hard drives of the
organization. The second version encrypts the local hard drives form the
machine of the organization. It also affects in the mapped folder of the
organization which is shared across the organization. Ransomware attacks
can cause a serious problem in the organization which is related to the
industrial sector.
 CryptXXX: CryptXXX is a newer version of ransomware which was used in
American Toy maker maisto. CryptXXX is spread through the Angler Exploit
Kit which infects the device through the Bedep Trojan, which then drops
information stealers on the device and adds professional grade encryption.
Local files as well as mounted drivers are encrypted.
 Mobile Ransomware: Mobile ransomware is a form of a malware which affects
mobile devices. Cybercriminal groups can use mobile malware to steal
important data and information. Cybercriminal groups can even lock a device.
The list to form a risk mitigation plan to stop the infection of Ransomware are as
follows:
 Give Information or training on basic cybersecurity to employees
 Avoid spear phishing by never clicking on links regardless of how legitimate
they may appear until the email is confirmed as legitimate.
 Use security software programs and make sure that they are constantly
updated with the latest security patches.
 Backup your data regularly at least make three copies of data.
 Avoid disclosing personal information to the untrusted source.
 Keep your programs and systems up to date.
 Stay informed about the latest threats.
 Restrict and tighten administrative rights on endpoints
 Use whitelisting software so that only the predefined software’s run on your
system
 Encourage the employees to report incidents
Ransomware attacks just like any other malware attacks is started when an end
user or someone working in the firm gives the attacker access to the firm’s
system. The means of access could be anything from a normal file to a link or
even just a software. There are a lot of risks after being attacked by the
ransomware; the primary of the risks being the chance to lose all the data on
system or the data being unusable altogether. So, first off, let’s talk about the
risks after being attacked my ransomware and then we will go on how to prevent
those types of attacks and then on what can we do after being attacked by the
ransomware.

The risks of ransomware

Data loss:
The first and foremost risk of being victim of ransomware is the loss of
data which is encrypted by and is in the control of attacker. And even if the asked
ransom is paid, there is no guarantee the attacker will give the access back to the
firm.

Chance for secondary attack:

DDoS attacks:E
Even after fulfilling the attackers demand , The system may still have
traces of the malware and can be used for DDoS Attacks by the attacker.
Financial loss:

Reputation Damage:

Some Facts about Ransomeware Attacks

 66 percent of organizations reported significant revenue loss after the


ransomware attack
 35 percent of businesses which paid a ransom paid between $350,000 and
$1.4 million and 7 percent of ransoms paid were greater than $1.4 million
 53 percent of victim organizations claim their brand and reputation were
damaged by the attack
 29 percent say they were forced to layoff employees due to financial
pressures brought on by a ransomware attack
 26 percent of businesses were forced to close down operations entirely for
some period of time due to a ransomware attack
 80 percent of business who paid a ransom were the victims of another attack.
 46 percent of those who paid ransoms regained access to their data only to
find that some or all of it was corrupted.

Source : Cyberreason; “ Ransomware: The true cost to business”.


Prevention from Ransomware

Prevention from ransomware and any other kind of malwares is relatively easy if
the defensive measures against malwares or unwanted software’s are taken
before time. Ransomware is also a kind of software, so, If all the security
measures are in order an working, then its unlikely for a firm to be a victim of
ransomware attack. Here are the steps we can take to prevent these kind of
attacks (explain gara sabai point halka)
Give Basic knowledge to employees:
Avoid clicking on unconfirmed mail/links
Use and update security software programs
Backup your Data:
Avoid disclosing personal information:
Keep system up to date:
Stay informed:
Restrict and tighten administrative rights:
Use whitelisting software:
Encourage the employees to report technical incidents:
Get Cyberattack Insurance:

With that being said, sometimes all measures of safety can be defied and if the
attacker finds a loophole or a backdoor, we can take some steps to make it harder
for the attacker to take the ransom after infecting the system, or maybe even get the
data back without paying the ransom which the attacker asks. The first step is ,of
course, to be calm and assess the situation rather than panicking and then following
the below solutions :

Immediately disconnect and isolate the infected system:


Determine if a decryptor is available:
Identify and Report the infection:
Donor connect external drives to the system:
Do not pay the ransom immediately:
These are all the steps we can take before and after A ransomware attack to any
firm. Prevention is always better than cure; so, not being attacked at all is a lot
better than being attacked and then searching for solutions. But as mentioned
above there are some steps we can take to turn the tide in our favor.

You might also like