Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
• In 2011, a ransomware worm imitating the Windows Product Activation notice surfaced.
• In February 2013, a ransomware worm based off the Stamp.EK exploit kit surfaced.
• CryptoLocker has raked in around 5 million dollars in the last 4 months of 2013.
How do criminals install ransomware?
• Ransomware generates a pop-up window, webpage, or email warning from
what looks like an official authority.
• Files are deleted once they are encrypted and generally there is a text file in the same
folder as the now-inaccessible files with instructions for payment.
• You may see a lock screen but not all variants show one.
• Instead you may only notice a problem when you attempt to open your files.
• Make sure automatic updating is turned on to get all the latest Microsoft
security updates and browser-related components (Java, Adobe, and the
like).
• If you run Windows 8 or Windows RT, you don’t need Microsoft Security
Essentials.
• Always have a good backup system in place, just in case your PC does
become infected and you can’t recover your files.
Identify The Ransomeware
• Windows Defender Offline (Some ransomware will not allow you to use the products
listed here, so you might have to start your computer from a Windows Defender
Offline disk.)
Conclusion
When it comes to malware attacks, knowledge is the best possible
weapon to prevent them. Be careful what you click!! Preventive
measures should be taken before ransomewares establish strong hold.
Keeping all the software updated and getting latest security updates
might help to prevent the attacks. Use of antivirus and original
software is highly recommended. Creating software restriction policy is
the best tool to prevent a Cryptolocker infection in the first place in
networks.
Thank You