Ransomware is a type of malicious software (malware) that attempts to extort money from victims by restricting access to a computer system or files. The most prevalent form of this profit-motivated malware is crypto-ransomware, which encrypts files into encoded messages that can only be decrypted (decoded) with a key held by the malicious actor.
How does ransomware work?
1. Ransomware infections occur when a user opens a malicious email attachment, clicks on a malicious link, or visits a website infected with malicious code, known as a drive-by download.
2. Once a system is infected, the ransomware contacts a command and control (C2) server to generate an encryption key and begins encrypting files on the victim’s machine.
3. The ransomware runs quietly in the background performing in-depth searches of all disk folders, including removable drives and network shares, and encrypts as many files as it can.
- Ransomware may also delete Shadow Volume Copies, destroy restore points, and overwrite free disk space to prevent victims from recovering their files and systems without paying the ransom.
- If a system is powered off as files are being encrypted, some ransomware variants resume where they left off when the system or device is powered on again.
4. After files are encrypted, a ransom note is displayed on the screen with instructions on how and where to pay the ransom and the length of time before the hacker or software destroys the decryption key.
- Some recent variants offer victims a ‘second chance’ to pay after the initial timer expires; however, the ‘second chance’ is often at least double the original ransom amount.
5. If the victim pays the ransom, the malware is supposed to contact the C2 server for the decryption key and begin decrypting the victim’s files; however, in many cases, the files are never decrypted.
- Some ransomware files can delete themselves in order to avoid detection and analysis by security researchers or law enforcement.
RANSOMWARE MITIGATION STRATEGIES
For many organizations, preventing ransomware entirely is nearly impossible, however, the impact of a successful infection can be greatly reduced if a robust data backup process is in place. Comprehensive data backups should be scheduled as often as possible and must be kept offline in a separate and secure location. The most effective method to prevent ransomware infections is to conduct regular training and awareness exercises with all employees to ensure users are proficient in safe Internet-browsing techniques and the ability to identify phishing emails.
Search Knowledge Base Articles
What is Ransomware?
Did you find this article useful?
During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, ...
Talk about a bad day: That's how you'd feel if a hacker managed to gain access to your home computer. Yes, it may seem that hackers primarily attack l...
A hacker is simply an online vandal, if you think about it. What do vandals do but damage things that don't belong to them, for no good reason other t...
With all the recent news about hackers and huge online attacks—think of the cyber attack on Sony Corp. in late 2014—it's easy to think that hackers ha...
An advance-fee fraud, also known as a 419 fraud, is a type of scam in which the victim is convinced to advance money to a stranger. In all such scams,...