Cryptoransomware is one of the pertinent issues in cybersecurity today. Cybercriminals use this form of malware like CryptoWall and CryptoLocker, to lock up crucial or personal data and charge ransoms for users to regain access.  According to the CryptoLocker article i chose, attackers have evolved and found a more natural way to monetize on crucial information on the web illegally. Initially, hackers breached security protocols, extracted data and sold in crimes exist to date. However, through ransomware, attackers now access data and encrypt it using public key infrastructure (Saiyed, 2016).

Ransomware attacks occur in several stages. A compromised site or installation contains an exploit kit that directs the victim's browser to download malware from a shadowed domain. The malware copies or installs itself on the victim's startup folder and starts automatically with each computer reboot.  After encryption, an attacker presents a victim with an extortive ransom note as he/she logs on to systems to access files.  The attacker holds a private key that decrypts the victim's locked up, and the latter has to purchase it to regain access before a specified time.

The target for such attacks is the typical common document storage formats and drive-by downloads like Office and PDF.  Hackers still use emails as a vector for ransomware. The user opens the infected document which convinces victims that it’s protected and cannot be viewed unless they fo

Pay to View the Entire Post

To view this post and other posts in this category please pay the amount below

Activate subscription for single

To view this post and other posts in this category please pay the amount below