Skip to main content

Everything you need to know about the ransomware used in global cyber attack

You've probably been reading articles about Wanna Decryptor, the ransomware that has hit companies and institutions around the world, including several hospitals in the United Kingdom. This ransomware hijacks the data of the infected computers and, to recover them, those responsible for the attack, who remain anonymous, request an economic reward from those affected in the form of the bitcoin virtual currency.However, experts in the field highlight that the payment of a ransom is not a guarantee that the information encrypted by the virus can be recovered.


This malware is accessed mainly through emails with spam receipts, fake invoices or email notices delivered to any type of device (smartphones, tablets and computers) and, once installed and activated, encrypts all data and files to block access without the password that allows you to decrypt them.


Shortly before this attack was carried out, in Nobbot we already warned of these new dangers that occur in the world of Internet and hackers, since the bad guys have adopted the modus operandi of the good ones.that companies like Microsoft or Adobe offer lifelong programs such as Office or Photoshop as a service, hackers sell ransomware , fashion malware and the one with the most victims worldwide, also as a service .


" Criminals are no longer isolated lords with a desire for notoriety, but hundreds of companies with commercials, advertising campaigns and muleros or intermediaries spread across many countries", explains Ignacio Franzoni, systems engineer at the corporate security solutions provider Fortinet.



The criminals are no longer isolated lords with a desire for notoriety, but hundreds of companies with commercials, advertising campaigns and muleros or intermediaries


Everything you need to know about the ransomware used in global cyber attack


Advice and simple management console


The good professionals of the dark side not only develop a piece of software with which the client will be able to encrypt their victim's PCs and then ask for a ransom to release them-that's basically what the ransomware-, but also will advise you when paying , since almost always the subscription is requested in bitcoins to leave no trace of the operation, and will provide you with a management console so that you can to develop easily without having deep computer knowledge.


"The client buys the software and the infrastructure on which it runs, and also has a very simple interface to execute the attack. The client is told: access this website, put the victim's URL and press the button ", explains Jose de la Cruz, technical director of the Japanese security software manufacturer Trend Micro.

The client of this type of malware has many online stores where Acquire the service .Stores that are hosted in the dark part of the Internet, in the so-called Deep Web, the one that is not indexed and does not appear in Google searches, and where in addition there is no trace thanks to the networks TOR, but they can also reside on the mainstream web, the one that Google puts mortals in a click away.


"The purchase process is easier than Amazon," says Ignacio Franzoni, of Fortinet, who also remembers that there are countries in the world where hacking is legal , and areas where the main economic activity is hacking ".An example is the Romanian population of Ramnicu Valcea, who since the fall of the Berlin Wall lives mostly from the Internet scam and that the Wired publication qualifies as the " world capital of cybercrime " .



The Romanian population of Ramnicu Valcea, described as the "world capital of cybercrime", lives mostly on the Internet scam



Everything you need to know about the ransomware used in global cyber attack


The main gateway of the ransomware in the companies is in the mailbox of the employees.First attacks date back to 2005, ransomware has become popular in the last four years, and in Spain many have suffered it in their meats with massive bells such as the Post Office or Endesa, where the bad guys used the widespread lack of caution of users.

Tips to defend against ransomware


What to do so that your company does not add up to the list of thousands of companies that every year have to pay a ransom to recover their information and meanwhile see how their computer equipment is left blank, or black, according to Look?


Jose de la Cruz recommends, first, raise awareness among employees.The bad guys use the ingenuity of the so-called "human link"." It falls out of ignorance or recklessness .If you don't expect anything Post, do not open an email from Post Office.Just like that, "says the Trend Micro expert.

Everything you need to know about the ransomware used in global cyber attack


Once everyone is aware of what can happen, it is convenient to install a good anti-ransomware solution on PCs and laptops , but also on mobile phones , which today have become the main working tool for many people.In addition, it is convenient to have a backup of the important information.After all, what criminals usually do is encrypt the hard drive, and if that hard drive is replicated, because we will have solved many problems

In this sense, Ignacio Franzoni, of Fortinet, recommends not paying, as a way to discourage hackers and finally put an end to these types of threats; however, in many cases it is not easy to choose to ignore blackmail.and after all, the bad guys play with the urgency of having their computers useless, their arms crossed and their clients unattended.


Finally, it is worth noting that the cyberattacks that request a rescue in exchange for the recovery of the systems was one of the most prominent threats for Internet users and companies in 2016.According to the prediction of IBM Securiy, this trend will continue to increase during this year.

Comments

Popular posts from this blog

Internet of plants: a tomato knows as much about networks as you

The possibility of plant species communicating through complex networks, what some scientists have called the internet of plants , is an issue that has been discussed for a long time, at least 20 years.It was in 1997 when the scientist Suzanne Simard , from the University of British Columbia in Vancouver (Canada), published a study in the journal Nature on how Forest plants use complex systems where species exchange nutrients, send warning signals and relate to the environment. Although there is no scientific consensus, several investigations seem to support this hypothesis.If confirmed, as we read in a fascinating report by the Sinc Agency, the forests would act as huge structures that are articulated under the soil through a network in which factors invisible to the human eye interact and can determine the future of the climate.Understanding how it works is the challenge that even science faces. internet of plants and the wisdom of forests The premise of Suzanne Simard ...

New setbacks for conspiranoicos: radiofrequencies do not affect health

New evidence published by the Scientific Advisory Committee on Radio Frequency and Health (CCARS) in its 2016 Radio Frequency and Health Report indicates that there are no adverse health effects derived of exposure to radio frequencies emitted by mobile phone antennas or radio and television broadcasting.No evidence has been found on the danger in wireless systems (Wi-Fi) or airport scanners. The new 2016 Radio Frequency and Health Report collects, updates and analyzes the scientific evidence on the subject for the period between January 2013 and June 2016. radio frequencies are not dangerous According to the conclusions of the report " the critical analysis of the evidence supports that there are no technical or sanitary reasons that justify the arbitrary and discretionary imposition of more demanding exposure limits than those recommended by WHO-ICNIRP and the Union European ", while the application of more restrictive limits" would imply increasing the n...

GIF history: where they come from and where they are going

Funny, witty, curious... GIFs have already become a regular resource in social networks and messaging applications and have become part of our daily lives and jokes.It is an image format that has evolved significantly throughout its history and is experiencing a new awakening. In fact, to find its origins, we must go back more than twenty years ago .A moment in which they had little to do with what we know today and an evolution that we could not stop review.So let's find out where they come from and try to catch a glimpse of where they are going. What is a GIF The word GIF responds to the acronym of Graphics Interchange Format , or what is the same, graphic exchange format.A term for the graphic format used in the network for both static images and animations.In more concrete terms, it supports 8 bits per pixel and allows you to display images with up to 256 colors simultaneously-limited by a palette of 16 million-. This particularity makes it a perfect ally of infogr...

Amazon Prime Video arrives in Spain: this is all you need to know

That during the last years there has been a change in the way we enjoy audiovisual content is an obvious reality, as reflected by the huge popularity of streaming services like Netflix and the like.A context in which new competitors are constantly added and that, after the landing of this company in our country just over a year ago, is in full transformation. In fact, today we have learned of the incursion of a new protagonist in this area.Yes, because Amazon Prime Video has just arrived in Spain .A landing that takes place only two weeks away that of HBO, which culminates in a 2016 sown of changes.But, what exactly does it consist of? What advantages and disadvantages does it have compared to the "of its kind"? WHAT AMAZON PRIME VIDEO OFFERS The type, quality and quantity of movies and series offered by the service will be key when determining your success.A catalog a priori smaller than that of HBO and Netflix, but in which we find titles like Seinfield , Into...

What we know and what we suspect in the new Facebook algorithm change

"In my time, we read the newspaper in Facebook ".By 2020, nostalgia has taken over billions of people.In its memory, 2018, when Facebook stopped being Facebook to become Facebook again.Paraiso of engagement for brands and media, land paid for clickbaits and fake news, the social network of Mark Zuckerberg has given a rudder to his algorithm. He wants to return to his origins .And this is what will happen. Related If something goes well, to change it.40.653 million dollars entered in 2017.More than 2.100 million active users per month, a quarter of the world's population.But Zuckerberg is not one of those, of which they are.Want a Facebook with more social connections between people and less presence of brands and media .And what do your users want? Nearly two-thirds of American adults consume news on social networks.More than half do so on their Facebook walls.Pew Research Center data points to a clear trend: Facebook is becoming a media platform.54% of Facebook u...

Twitter shows the best of ourselves (it wasn't always going to be the worst)

In the era of social networks, accustomed to interact daily with Facebook, Twitter, Instagram, Google or WhatsApp, we forget that these tools are phenomenal in the History of Humanity capable of mobilize hundreds of thousands of people in very different geographical locations in a matter of hours or even minutes. Already in the past, Twitter has asserted its more social dimension to mobilize people, companies or organizations and also, from a broader perspective, feelings of solidarity and support or also of rejection and repulses towards causes with an important mediatic impact.Recently, Twitter was once again the engine of solidarity after Dortmund's explosions as the Borussia Dortmund team bus passed on its way to the local stadium on the occasion of the Champions League match between the Borussia and the Monaco. These explosions did not have the devastating effect that they could have caused , so that everything remained in a major social commotion at international lev...

Most apps for children violate your privacy

Do you know if apps with which children enjoy their safety? A team of researchers from the International Computer Science Institute (ICSI) of the University of Berkeley has studied compliance with the Online Privacy Protection Act (COPPA) in these mobile applications for the little ones, through a scalable dynamic analysis that allows the automatic evaluation of privacy behaviors of Android apps. After studying 5,855 applications aimed at children, the research concludes that most of these apps, 57%, violate the privacy of their users mainly due to the use of data by third parties. apps for children and privacy Although many apps offer options in their configuration to respect the federal law that protects minors in the United States, by disabling tracking, their results suggest that a majority of applications either do not use these options or propagate them in wrong way. In addition, researchers believe that 19% of apps for children send user IDs to third parties to show ...

Are social networks damaging democracy?

The revelations according to which Russian agents inserted ads on Facebook that tried to influence the 2016 US elections raise a disturbing question: is Facebook bad for democracy? As an expert in the social and political repercussions of technology, I think that the problem is not exclusively from Facebook, but that it is much broader: Social networks are weakening some of the conditions that have historically enabled the existence of national states democratic. I understand that it is a dramatic statement, and I do not expect anyone to believe it immediately, but considering that almost half of all potential voters received false news promoted by the Russians in Facebook is an argument that must be debated. Associate Professor of Philosophy, Director of Center for Professional and Applied Ethics, University of North Carolina-Charlotte How we create a shared reality Let's start with two concepts: the "imagined community" and the "bubble filter". ...

This is how visual challenges star in some of the most viral content

Constantly, we all receive in our mail, our WhatsApp or our Facebook account, games that try to test our ingenuity, imagination or visual skill.There are a thousand types, more fun or darker.But they have one thing in common: we cannot avoid trying them and see if we are able to solve them .This is how the visual challenges star in some of the most viral content of the network. Visual challenges, why are we crazy? The visual challenges are games.So, they attend to this playful and fun part that people have no choice but to feed from time to time.They are pure and hard entertainment, with no more pretensions, and that desire to Having fun represents one of the main features that are sought when surfing the Internet . Another of the qualities for which they succeed is because they challenge the mind directly.Human beings love that feeling of feeling a little troubled, somewhat lost, but convinced that there is a solution to that enigma to which, sooner or later, it will come.Rathe...

Everything (much) that Google and Facebook know about you

The Cambridge Analytica scandal It is one of the most serious violations of privacy in history.More than 50 million confidential data were obtained from Facebook without the consent of the users.Mark Zuckerberg himself admitted the flaws in the platform and announce some important changes. Related Cambridge Analytica is a company that used the data extracted from Facebook accounts to develop a powerful software capable of influencing the elections of several countries.It did so through the creation of political ads The research has revealed that the company began collecting personal data from users in 2014 without their authorization. The sudden discovery of privacy Many people now wonder that (and how much) information about them is really in the hands of the social network.The campaign #deletefacebook , to unsubscribe from the platform is having a lot of resonance.that the world has now discovered that the big multinationals know a lot about us.Good morning, green sleev...