OSCEND
latest news
Lorem ipsum dolor amet consect
avatar
MOBile ui, creative, Team
26 SEP
32 views

What is Ransomware?

It’s a form of malicious software, “malware” for short, that essentially holds a device hostage until a fee is paid to restore it to normal. It's a virus that spreads via email attachments mostly. When the user downloads that attachment,it encrypts the files on the system by attacking predefined file extensions & deletes the original ones.It makes files and data stored on computers inaccessible unless a fee is paid.User is left with encrypted files only & requires keys to decrypt it. This key is provided by hackers once ransom is paid.

Facts about Ransomware?

  • If you refuse to pay the ransom, then either you have to restore all those files from backup, if any or you will loose them forever.
  • It's very difficult to track down the hackers because ransom is mostly paid in digital currencies.
  • Old systems with security features not in sync with latest industry standards are more vulnerable for ransomware attacks.
  • You can pay the ransom in bitcoins by purchasing them via any broker or specialist exchange first. The bitcoins in digital wallet can then be transferred to any other registered wallet of hacker anonymously. On receiving the bitcoins, hacker will handover the keys to the sender for decrypting files.

How to protect your data?

Current Solution:

The most effective form of prevention for businesses or individuals is to back up files. If data is backed up regularly to an external source, a computer can be reset to its factory settings and then the backed-up files can be reinstalled, essentially wiping the

Ransomware from the system. Ransomware worms are easy for hackers to modify so even if a fix is found for one bug it won’t necessarily safeguard against a future attack.

Proposed Solution:

It is virtually impossible to crack the security of Vcrypt application because:

  • User can create own in-house data encryption algorithm to protect any application data (data files encrypt & new encrypted format will be create), so data cannot be understood by outer world.
  • User will change time-to-time encryption mechanism/policies, so data will be more secure.
  • User can provide a restricted running environment, so data can be accessed only in an authorized way.
  • Data on local device is always in encrypted format bound with in-house encryption keys & gets decrypted only during runtime. So, hackers can’t access the original data at any point of time. Hence, data is always protected.

Moreover, user can define/change the file extensions in case of ransomware attack. So, the ransomware won’t be able to detect predefined file types, hence won’t be able to encrypt the data.

Case Study:

Wanna Cry decryptor Ransomware:
https://www.cnet.com/news/wannacry-wannacrypt-uiwix-ransomware-everything-you-need-to-know/

Petya Ransomware:
https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how

Comments : 2
ANDREW says 5 October 2015 at 9:00 pm

Nesciunt. eque porro quisquam est qui dolorem ipsum quia dolor sit amet consectetur adipisci velit quia non numquam eius modi tempora incidunt ut labore et dolore magnam. Lorem ipsum dolor sit consectetur adipisicing elit sed do eiusmod tempor incididunt.

reply
JAMES says 5 October 2015 at 12:00 pm

Nesciunt. eque porro quisquam est qui dolorem ipsum quia dolor sit amet consectetur adipisci velit quia non numquam eius modi tempora incidunt ut labore et dolore magnam. Lorem ipsum dolor sit consectetur adipisicing elit sed do eiusmod tempor incididunt.

reply
Write a comment