What is Ransomware?
It’s a form of malicious software, “malware” for short, that essentially holds a device hostage until a fee is paid to restore it to normal. It's a virus that spreads via email attachments mostly. When the user downloads that attachment,it encrypts the files on the system by attacking predefined file extensions & deletes the original ones.It makes files and data stored on computers inaccessible unless a fee is paid.User is left with encrypted files only & requires keys to decrypt it. This key is provided by hackers once ransom is paid.
Facts about Ransomware?
- If you refuse to pay the ransom, then either you have to restore all those files from backup, if any or you will loose them forever.
- It's very difficult to track down the hackers because ransom is mostly paid in digital currencies.
- Old systems with security features not in sync with latest industry standards are more vulnerable for ransomware attacks.
- You can pay the ransom in bitcoins by purchasing them via any broker or specialist exchange first. The bitcoins in digital wallet can then be transferred to any other registered wallet of hacker anonymously. On receiving the bitcoins, hacker will handover the keys to the sender for decrypting files.
How to protect your data?Current Solution:
The most effective form of prevention for businesses or individuals is to back up files. If data is backed up regularly to an external source, a computer can be reset to its factory settings and then the backed-up files can be reinstalled, essentially wiping the
Ransomware from the system. Ransomware worms are easy for hackers to modify so even if a fix is found for one bug it won’t necessarily safeguard against a future attack.Proposed Solution:
It is virtually impossible to crack the security of Vcrypt application because:
- User can create own in-house data encryption algorithm to protect any application data (data files encrypt & new encrypted format will be create), so data cannot be understood by outer world.
- User will change time-to-time encryption mechanism/policies, so data will be more secure.
- User can provide a restricted running environment, so data can be accessed only in an authorized way.
- Data on local device is always in encrypted format bound with in-house encryption keys & gets decrypted only during runtime. So, hackers can’t access the original data at any point of time. Hence, data is always protected.
Moreover, user can define/change the file extensions in case of ransomware attack. So, the ransomware won’t be able to detect predefined file types, hence won’t be able to encrypt the data.
Wanna Cry decryptor Ransomware: