Security Tip (ST19-001) - Protecting Against Ransomware
Posted over 5 years ago by Naufil Mirsinge
Post a topicPeople who like this
Delete Comment
This post will be deleted permanently. Are you sure?
Code Snippet
Html
Html
Css
JavaScript
Sass
Xml
Ruby
PHP
Java
C#
C++
ObjectiveC
Perl
Python
VB
SQL
Generic Language
What is ransomware?
Ransomware is a type of malware threat actors use to infect computers and encrypt computer files until a ransom is paid. (See Protecting Against Malicious Code for more information on malware.) After the initial infection, ransomware will attempt to spread to connected systems, including shared storage drives and other accessible computers.
If the threat actor’s ransom demands are not met (i.e., if the victim does not pay the ransom), the files or encrypted data will usually remain encrypted and unavailable to the victim. Even after a ransom has been paid to unlock encrypted files, threat actors will sometimes demand additional payments, delete a victim’s data, refuse to decrypt the data, or decline to provide a working decryption key to restore the victim’s access. The Federal Government does not support paying ransomware demands. (See the FBI’s ransomware article.)
How does ransomware work?
Ransomware identifies the drives on an infected system and begins to encrypt the files within each drive. Ransomware generally adds an extension to the encrypted files, such as
.aaa
,.micro
,.encrypted
,.ttt
,.xyz
,.zzz
,.locky
,.crypt
,.cryptolocker
,.vault
, or.petya
, to show that the files have been encrypted—the file extension used is unique to the ransomware type.Once the ransomware has completed file encryption, it creates and displays a file or files containing instructions on how the victim can pay the ransom. If the victim pays the ransom, the threat actor may provide a cryptographic key that the victim can use to unlock the files, making them accessible.
How is ransomware delivered?
Ransomware is commonly delivered through phishing emails or via “drive-by downloads.” Phishing emails often appear as though they have been sent from a legitimate organization or someone known to the victim and entice the user to click on a malicious link or open a malicious attachment. A “drive-by download” is a program that is automatically downloaded from the internet without the user’s consent or often without their knowledge. It is possible the malicious code may run after download, without user interaction. After the malicious code has been run, the computer becomes infected with ransomware.
What can I do to protect my data and networks?
What can I do to prevent ransomware infections?
.com
instead of.net
). (See Using Caution with Email Attachments.)How do I respond to a ransomware infection?
What do I do if my computer is infected with ransomware?
References
CISA Ransomware page
CISA Malware Analysis Submission page
CISA Mailing Lists and Feeds page
Protecting Against Malicious Code
Protecting Your Privacy
Understanding Firewalls for Home and Small Office Use
Understanding Patches and Software Updates
Using Caution with Email Attachments
Handling Destructive Malware
Choosing and Protecting Passwords
Supplementing Passwords
Anti-Phishing Working Group’s website
Carnegie Mellon Software Engineering Institute blog post: Ransomware: Best Prac…
FBI article: Incidents of Ransomware on the Rise
FBI Tech Tuesday: Building a Digital Defense Against Ransomware at Home
Authors
CISA
0 Votes
0 Comments
Login or Sign up to post a comment