Ransomware why do they fear more than other types of viruses?




Since the end of 2015 until early 2016, the ransomware attacks have claimed several lives including hospitals, water treatment systems to name a few. These ransonwares all methods of similar attacks although each specificity. Their method is well known to researchers, these ransonwares continue to scared by tackling such sensitive structures as hospitals. Their methods of attack are to infect their target by the phishing method and then, if phishing is successful, to encrypt files on the computer contents and request payment of a ransom in exchange for the key to decrypt .


Haran Carvey, senior security researcher at Dell SecureWorks, says that at the time, attackers by Trojans were attacking schemes, as these could be accessed from the Internet. He added that afterwards the attackers have focused on particular targets because they had data that interested them or to steal or to remove in order to harm. According to the researcher, the phenomenon of ransonwares is even more serious because once you have files, you are a potential target. This would explain the fact that these types of viruses are also feared, but also the growth of increasingly marked their numbers.


Another aspect that makes them particularly formidable ransonwares is that they use the phishing method, managing to convince users not often advised to click on links or attachments. Some even manage to convince users to change the settings of their system giving rights to the virus to settle. Many security experts who believe that given the growing increasingly fast ransonwares and ambitions and skills increasingly growing of those deploying them, things will go from bad to worse for many organizations .


A point that was noted by researchers, as favoring increased ransonwares, is that they prey on the weak. Indeed, the favorite victims of hackers using ransonwares to reach their victims are SMEs, an individual can not pay too much money to pay the ransom, and large companies generally having a successful computer security and means to counter this type of attack. The prime target remains small and medium enterprises, which are very sensitive to IT risk and less vigilant.


According to experts, if some hacker then led attacks to some beliefs justified or not, moreover, it is the pursuit of easy money that drives people who lead attacks ransonware and n ‘ not spare even the drinking water treatment systems as has been the case recently. Some ransonwares can claim ransoms which varies between 10 000 and € 20 000, amounts which are often paid in the form of bitcoins attackers. Businesses access at the request of pirates in most cases as the data are what they hold most dear, and that without them no activity would be possible.


Security researcher Roel Schouenwenberg believes that the corporate Silence contributes to the proliferation of ransonwares. According to him, when a company is under attack by ransonware, it seeks to pay the ransom as quickly and as quietly as possible so as not to destroy his reputation and be seen as a company with a poor security system or to do so not to expose themselves to attacks from other ransonwares whose authors are aware that a flaw in its security system.


The ransonwares are also known to be particularly effective when it comes to enjoy the failures that may have some systems or servers. This is the case with ransonwares Samsam exploiting a flaw in the JBoss application server to perpetrate their attacks. The challenge for organizations to protect systems that can counter these ransonwares is also related to the fact that they target different types of platforms as well as web applications mobile applications to reach their victims. According to Kevin Kelly, CEO of LGS Innovations, a security company, the large amount of software that are installed around the systems and the Internet of Things that connects far spared internet structures, multiply vulnerabilities information systems that will not only increase and allow ransonwares to do even more damage.



No comments:

Powered by Blogger.