<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>ransomware Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/tag/ransomware/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/tag/ransomware/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Sat, 26 Oct 2024 02:10:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>ransomware Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/tag/ransomware/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>What Do the Ransomware Names Mean?</title>
		<link>https://www.trickyenough.com/what-do-the-ransomware-names-mean/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-do-the-ransomware-names-mean</link>
					<comments>https://www.trickyenough.com/what-do-the-ransomware-names-mean/#respond</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Wed, 12 Jan 2022 07:46:12 +0000</pubDate>
				<category><![CDATA[Data]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[malicious program]]></category>
		<category><![CDATA[malware]]></category>
		<category><![CDATA[malware threats]]></category>
		<category><![CDATA[ransomeware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[Ransomware Names]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Security Measures]]></category>
		<guid isPermaLink="false">https://www.trickyenough.com/?p=45992</guid>

					<description><![CDATA[<p>Ransomware is a particularly insidious category of malware that can lock computers, encrypt files, or both, and hold them for ransom. Many different ransomware strains can vary in their functionality and infection capabilities. And as you may have noticed, some ransomware strains also have colourful names. What do the ransomware names mean, and what makes...</p>
<p>The post <a href="https://www.trickyenough.com/what-do-the-ransomware-names-mean/">What Do the Ransomware Names Mean?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
</head><body><p>Ransomware is a particularly insidious category of malware that can lock computers, encrypt files, or both, and hold them for ransom. Many <a href="https://www.trickyenough.com/a-comprehensive-guide-to-ransomware-backup-protection/" target="_blank" rel="noreferrer noopener">different ransomware strains</a> can vary in their functionality and infection capabilities. And as you may have noticed, some ransomware strains also have colourful names. What do the ransomware names mean, and what makes one ransomware different from the next?</p>



<h2 class="wp-block-heading" id="h-ryuk">Ryuk </h2>



<p>Ryuk is a <em>Shinigami</em> or God of death in the Japanese animated series <em>Death Note</em>. The show&#8217;s protagonist discovers the character and attempts to use him for good deeds while fulfilling Ryuk&#8217;s hunger for amusement. Fans have drawn entertainment both from Ryuk and the show&#8217;s dark humour. </p>



<p>Unfortunately, there&#8217;s nothing humorous about Ryuk ransomware, which researchers found in 2017. What makes <a href="https://www.malwarebytes.com/ryuk-ransomware" target="_blank" rel="nofollow noopener">Ryuk ransomware</a> more threatening than other strains is its ability to isolate network drives and resources and delete and disable restoration tools and backup systems. It can also spread more easily with its new worm-like capabilities. </p>



<p>Extortionists typically use Ryuk for targeted attacks. The malware has infected businesses, media websites, and even hospitals. Researchers estimate that the malware raised over $61 million between February 2018 and October 2019 alone. </p>



<h2 class="wp-block-heading" id="h-petya">Petya </h2>



<p>Petya is another ransomware strain with a name drawn from popular culture. In the 1995 James Bond film <em>GoldenEye</em>, Petya was a Soviet weapon satellite carrying a weapon of mass destruction. The Petya ransomware was similarly destructive and innovative, though it wasn&#8217;t unusually infectious. </p>



<p>The first Petya ransomware strain was unique because it blocked victims from accessing their computers rather than encrypting files. The malware spread through phishing emails that carried job offers. But for Petya to unleash havoc, users had to agree to grant it administrative control, which many experienced users recognized as a red flag.  </p>



<p>Later versions of Petya were more infectious and even more dangerous. One, in particular, NotPetya, may still give many computer users nightmares.</p>



<h2 class="wp-block-heading" id="h-notpetya">NotPetya</h2>



<p>In 2017, a variant of Petya started infecting computers that were so different that researchers dubbed it &#8216;NotPetya&#8217; to help people understand it was new ransomware. NotPetya was part of a cyberattack in Europe, primarily targeting companies in Ukraine. Later, NotPetya spread to Germany, Italy, France, Poland, the United Kingdom, and the United States. Unlike Petya, NotPetya did not seek administrative permissions. It also used a Windows <a href="https://docs.microsoft.com/en-us/previous-versions/windows/it-pro/windows-server-2012-r2-and-2012/hh831795(v=ws.11)" target="_blank" rel="nofollow noopener">Server Message Block (SMB)</a> protocol exploit called EternalBlue. While many researchers believe that the ransomware started from Russia as a political attack, its exploit may have been stolen from the U.S. National Security Agency (NSA). </p>



<h2 class="wp-block-heading" id="h-wannacry">WannaCry</h2>



<p>WannaCry got its name from strings of codes found in initial samples of the malware, but the name was apt because it made a lot of organizations want to shed tears of grief. The crypto-ransomware exploited an SMB vulnerability to infect countless hospitals, banks, and other companies globally, costing billions. Investigators later found that elements in North Korea were responsible for the malware. These are four pieces of ransomware with interesting names. To <a href="https://www.zdnet.com/article/ransomware-in-2022-were-all-screwed/" target="_blank" rel="nofollow noopener">protect your data</a> from any of them, use the most secure version of your operating system and invest in anti-malware technology with ransomware rollback capabilities.</p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/10-ways-protect-ransomware/" target="_blank" rel="noreferrer noopener">10 Ways to Protect Yourself from Ransomware</a>.</p>



<p><a href="https://www.trickyenough.com/security-good-antivirus/" target="_blank" rel="noreferrer noopener">What Security features must have in Good Antivirus</a>?</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/what-do-the-ransomware-names-mean/">What Do the Ransomware Names Mean?</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/what-do-the-ransomware-names-mean/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">45992</post-id>	</item>
		<item>
		<title>10 Ways to Protect Yourself from Ransomware</title>
		<link>https://www.trickyenough.com/10-ways-protect-ransomware/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=10-ways-protect-ransomware</link>
					<comments>https://www.trickyenough.com/10-ways-protect-ransomware/#comments</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Mon, 19 Jun 2017 18:07:16 +0000</pubDate>
				<category><![CDATA[Security]]></category>
		<category><![CDATA[Web]]></category>
		<category><![CDATA[Protect Yourself from Ransomware]]></category>
		<category><![CDATA[ransomware]]></category>
		<category><![CDATA[safe from Ransomware]]></category>
		<category><![CDATA[Virus]]></category>
		<guid isPermaLink="false">https://www.trickyenough.com/?p=3105</guid>

					<description><![CDATA[<p>Ransomware is malicious code that infects a computer system and prevents access to files until the user pays the cyber criminal a ransom in order to restore access. What is Ransomware? The short answer to the question what is ransomware is it&#226;&#8364;&#8482;s basically a virus that encrypts your files then locks your PC and finally...</p>
<p>The post <a href="https://www.trickyenough.com/10-ways-protect-ransomware/">10 Ways to Protect Yourself from Ransomware</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org/TR/REC-html40/loose.dtd">
<html><body><p>Ransomware is malicious code that infects a computer system and prevents access to files until the user pays the cyber criminal a ransom in order to restore access.</p>



<h2 class="wp-block-heading" id="h-what-is-ransomware">What is Ransomware?</h2>



<p>The short answer to the question <a href="https://www.zonealarm.com/blog/2017/06/what-is-ransomware/" rel="nofollow">what is ransomware</a> is it&acirc;&euro;&trade;s basically a virus that encrypts your files then locks your PC and finally displays a message with instructions on how the ransom can be paid to get the code to unlock the Files &amp; Computer. More&nbsp; or the entire hard drive. The only way to unlock the files or drive is the get the decryption key from the attacker.</p>



<p>Ransomware was invented in 1996 and soon became popular in Russia. It has however spread internationally and is now big business. For example, the <a href="https://www.trickyenough.com/a-comprehensive-guide-to-ransomware-backup-protection/#" target="_blank" rel="noreferrer noopener">most famous ransomware</a>, Cryptolocker, made over 3 million in ransom payments before being taken down. The FBI estimates that another ransomware, Cryptowall, had made over $18 million by June 2016.</p>



<p>Payment is made using Bitcoins which allows the attackers to remain anonymous.</p>



<p>Many computer users who found that they have been attacked don&#8217;t have advanced computer knowledge and therefore opt to pay the ransom especially if the files are important to them.</p>



<p>One of the reasons it is currently one of the biggest concerns for security professionals is that once a computer is attacked and the files encrypted, there is usually no other way to get the files back without the decryption key. Current ransomware such as Cryptowall uses asymmetric encryption techniques where the decryption key differs from the encryption key and isn&#8217;t stored next to encryption data.</p>



<p>Ransomware must, therefore, be stopped before it infects a computer because the data will become unrecoverable. This article takes you through some of the steps you can take to prevent your computer from being infected and what to do if the unthinkable happens.</p>



<h2 class="wp-block-heading" id="h-important-points-to-keep-yourself-safe-from-ransomware">Important points to keep yourself safe from Ransomware.</h2>



<ol class="wp-block-list">
<li>
<h3 class="western">Backup Regularly</h3>
</li>
</ol>



<p>You must back up important files regularly. In fact, with the proliferation of <a href="https://www.trickyenough.com/what-is-cloud-computing/">cloud services</a>, you have no excuse not to back up. The best way to backup is to have one copy of files for a cloud service and another copy in physical portable media. The physical copy should be read-only to prevent accidental overwriting or deletion.</p>



<ol class="wp-block-list" start="2">
<li>
<h3 class="western">Check Your Back Up Often</h3>
</li>
</ol>



<p>Secondly, check your backup often to ensure that your data is intact. Even cloud services can be hacked, and physical media can get damaged.</p>



<ol class="wp-block-list" start="3">
<li>
<h3 class="western">Be Paranoid About Email</h3>
</li>
</ol>



<p>Ransomware is primarily distributed through fake email phishing messages. Phishing is a criminal practice where an attacker sends you an email that appears to come from someone you trust such as your bank. The attacker will typically ask you to click on a link or open an attachment. The instant you do so, your machine gets infected. Never click links in emails unless you are 100 percent sure about the identity of the person sending the email and never download attachments from unknown senders. Instead <a href="https://www.trickyenough.com/how-to-get-rid-of-spam/">get rid of this kind of emails</a>.</p>



<ol class="wp-block-list" start="4">
<li>
<h3 class="western">Don&#8217;t Trust Social Media</h3>
</li>
</ol>



<p>Cyber criminals also use social media to distribute ransomware. As with email don&#8217;t click on links from friends and never download attachments. Your friend&acirc;&euro;&trade;s accounts may have infected, files and they may not even be aware that they have sent you a message.</p>



<ol class="wp-block-list" start="5">
<li>
<h3 class="western">Show File Extensions</h3>
</li>
</ol>



<p>If you are running Windows, set your computer to show files extensions. This way, you can easily see the type of file, for example, .docx, .pdf etc. Malicious files will usually have extensions such as .exe, .vbs and .scr. If you find files ending with these types of extensions you should be very suspicious.</p>



<ol class="wp-block-list" start="6">
<li>
<h3 class="western">Update Regularly</h3>
</li>
</ol>



<p>Set your computer to update the operating system regularly and don&#8217;t ignore system notifications. Software companies regularly release updates to patch security holes they have discovered.</p>



<ol class="wp-block-list" start="7">
<li>
<h3 class="western">Use a Good Antivirus</h3>
</li>
</ol>



<p>There are many antivirus products, but not all have the capability to protect you from ransomware. The good ones are able to protect your files once a threat is detected. You will need to spend some money on a good antivirus. Check virus testing sites to see if the product has anti-ransomware features and have a look at the test scores.</p>



<ol class="wp-block-list" start="8">
<li>
<h3 class="western">Find Out the Name of the Ransomware</h3>
</li>
</ol>



<p>If your computer is infected, find out the name of the virus or malware as <a href="https://www.zonealarm.com/software/free-antivirus/" rel="nofollow"><b>security companies</b></a> have managed to crack older versions so you may be able to get your files back.</p>



<ol class="wp-block-list" start="9">
<li>
<h3 class="western">Disconnect the Machine if Something is Amiss</h3>
</li>
</ol>



<p>If you notice some weird process going on, yank the power cable or Internet connection immediately. Depending on the ransomware, there may be a good chance the malware has not yet erased the encryption key in which case a security expert may able to restore your files.</p>



<ol class="wp-block-list" start="10">
<li>
<h3 class="western">Don&#8217;t Pay the Ransom</h3>
</li>
</ol>



<p>If you have done all of the above things and your computer still gets infected, don&#8217;t pay the ransom. Payment of Ransom is what drives the business. If everyone refused to pay, the business would die, and we would all be safe.</p>



<h2 class="wp-block-heading" id="h-conclusion">Conclusion</h2>



<p>Finally, if you do become infected, report the crime to the authorities and collaborate to help put an end to this despicable practice.</p>
</body></html>
<p>The post <a href="https://www.trickyenough.com/10-ways-protect-ransomware/">10 Ways to Protect Yourself from Ransomware</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/10-ways-protect-ransomware/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3105</post-id>	</item>
	</channel>
</rss>
