In recent years, the ransomware malware that encrypts information of users and demands a ransom for their recovery, (this is a kidnapping every rule) has grown steadily becoming one of the main threats to both home users and For businesses. When this malicious software gets infect our team means that e l cyber criminal will have the ability to lock your computer from a remote location and, from there, free way to encrypt your files taking control of all information and data stored. At this point the virus asks us, through a pop -up window, the payment of a ransom to recover our data.
Well, it seems that last March was the month in which such attacks have been more active as a result of the spread of multiple variants launched in several waves. According to telemetry services ESET, the figures ransomware detection rates have reached their highest shares in March in a long time. On issues of malware arguably therefore, no doubt, "March is the cruelest month."
The countries that have detected the highest rates of this dangerous threat have been Spain, UK, Ireland, Japan and New Zealand. Among the different variants of ransomware launched by cybercriminals he has reappeared TeslaCrypt, one of the techniques that had more "success": supplanting the email Spanish postal service (Correos). This time, to address each user's unique credentials have been used which were to be used for the payment of the ransom.
In March also he came back strongly variant CTB-Locker, through which criminals can encrypt files from web servers and thus attack the sites hosted on them. Although undoubtedly they have been Locky and TeslaCrypt types of ransomware that most have spread worldwide. Your gateway to our computers is email, with different issues in our inbox try to delude to make execute an infected file. On other occasions also, this type of ransomware sneaks through advertising on popular websites hosted (which has happened recently in the United States). These are ads that redirect domains, which previously belonged to legitimate online advertising providers and now have been bought by criminals.
On the other hand also there is a certain type of ransomware that has different characteristics to the rest. Among them Petya, able to encrypt a portion of the disk boot sector making the system and stored files become inaccessible to its owner unless the corresponding pay ransom to recover.
As for the affected operating systems, not just Windows also we find Android devices in addition to a Linux server, and in March has also detected a new ransomware called KeRanger whose aim has been to Mac OS. With KeRanger it was possible to infect an application to download files quickly by BitTorrent (Transmission) that was accessible to users on the official website. Those would be the application will be downloaded to your computer letting a malicious software would begin encrypting files. Yes, let us have the details in each folder with encrypted files, a text file where would the instructions to pay the ransom for our information.
"That ransomware infections have reached these very disturbing levels shows that behind these campaigns are bands cybercriminals are making a killing," says Josep Albors, director of the laboratory of ESET Spain. There will be very attentive, then, to prevent ransomware strain into our computers. Image by; simplilearn.com