Attacks on devices with ransomware on the rise

This modality prevents entry to the computer and cybercriminals request a ransom in cryptocurrencies from the user in exchange for saving their information

There are various types of cyberattacks. In the last year, viruses have increased due to hacking on mobile phones. One of the most popular is known as ransomware, a modality that prevents users from accessing the information on their device and threatens to destroy it if they do not cancel a ransom within a specified time.

It is important for users to be clear that ransomware “consists of the criminal encrypting the data and requesting a ransom through a message or pop-up window, carrying out what is called virtual hijacking.

Cybercriminals indicate that the victim will not be able to recover their data, or enter their system unless they cancel the ransom, which is generally requested in some type of cryptocurrency because it limits the tracking and makes the payment practically anonymous.

This anonymity process is possible due to the “cryptocurrency mixing or tumbing services that mix funds from different wallets, washing the cryptocurrency that makes it difficult to track transactions”, which makes it easier for cybercriminals extort money from their victims.

However, the payment of said ransom does not guarantee that the victim can unlock their device or access their files, therefore, it is recommended not to pay any ransom.

Common crimes

Hackers use different methodologies to attack their victims. Taking advantage of the fragility of the equipment to introduce malware, another way is to obtain the credentials to access the equipment “with administrator privileges through deception, procedural weaknesses, vulnerabilities in the software or the use of bad design practices such as hard-code of passwords.”

A very simple and common way for cybercriminals is to deceive users with so-called social engineering techniques such as fake emails. They also use social media and instant messaging channels. As well as the “method known as drive-by download and watering hole, which consist of directing victims to previously infected websites, downloading the malware without them knowing it.”

M. Rodríguez

Source: iproup.com

You might also like