When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
Early computers were fairly isolated systems reserved for niche applications, mainly in academic environments.
Todays world is different.
Computers power many aspects of our day-to-day lives.
They are faster than ever and highly inter-connected.
They are in our pockets, homes and offices, but also in our toothbrushes and refrigerators.
They even power our critical infrastructure.
This now widespread reliance on computers (and the data they process) attracts new kinds of malfeasants.
Over time, computer-based crime has become organized.
There is one sort of attack that illustrates this transition better than most:ransomware.
Senior Security Consultant at Black Duck Software (formerly the Synopsys Software Integrity Group).
Most ransomware attacks follow a simple pattern:
1.
They start by running a malicious tool, an encryptor, on the target system.
Then, they make their presence known, from red screens to timers.
There are some instances of ransomware that do not encrypt thedata.
Unfortunately, attackers can (still) benefit from a very simple tactic: asking nicely.
Challenge #2: Receiving the ransom payment without betraying the attacker’s identity.
Fifteen years ago, this challenge alone would have hindered the expansion of ransomware gangs.
However, the rise of cryptocurrency presented a solution to this challenge.
This backup model relies on a few assumptions.
Reality often challenges both assumptions.
Many companies have backup processes in place.
Fewer havedata recoveryplans describing what to do with the backups to return to a working state.
This makes the recovery process clunky and often unsuccessful.
Ransomware attacks also challenge the second assumption.
Wrapping up
At a technical level, ransomware is not a terribly novel threat.
Just remember: do not pay the ransom.
Check out the best cloud antivirus.
The views expressed here are those of the author and are not necessarily those of TechRadarPro or Future plc.
If you are interested in contributing find out more here:https://www.techradar.com/news/submit-your-story-to-techradar-pro