When it involves ransomware protection, it is better to be safer than sorry, isn’t it? To achieve this goal, a vigilant outlook and the right security software are essential, since a moment of carelessness is enough to fall victim to a cyberattack.
You probably know what ransomware is, but it is worth remembering: it is a type of extortion malware that can lock down your computer and then demand a ransom to return the operating systems. In May 2017, for example, the WannaCry variant spread around the world and reached more than 100 million users, claiming some major victims, such as the UK’s National Health Service (NHS). It infected more than 230,000 computers in 150 countries in just one day.
Since then, ransomware has spread around the world, with new types and new hits, and with that, cybersecurity solution makers have increasingly focused their actions on preventing attacks by this “pirate” of nowadays. And to support the fight against this increasingly frequent cybercrime, we launched the #stopransomwareattacks campaign on our social networks, with the aim of raising awareness among IT professionals and society about the variety of ways this malware appears on operating systems and the risks caused by a simple click.
What are the kinds of attacks?
The forms of attacks are diverse: ranging from messages about unlicensed applications to false claims about inappropriate content, in some cases resulting in the payment of fines or the need to restore devices to factory settings.
From the most aggressive to the most imperceptible forms, some of the main ransomware variants are:
Petya: It goes beyond hacking into files and can bring the entire system to a halt, causing devastating results.
zCrypt: It does not attack files directly; it acts like a classic virus, acting on recently handled files to boost the impact.
Jigsaw: This attack begins with a simple greeting message, followed by a ransom demand, threatening the victim with the removal of all their data within 72 hours.
Wannacry: The infection by this ransomware was indeed a global epidemic, scaring everyone and causing companies and government agencies to rush to seek protection solutions. The losses caused by this malicious software are estimated to have totaled $4 billion worldwide.
Ransomware, in all its forms and variants, represents a significant threat to both independent users and enterprises. That’s why it’s even more important to be aware of the threats it portrays and be extra careful in eventualities.
Join the #stopransomwareattacks campaign! Post pictures on your social media networks with signs written with the hashtag, tag senhasegura’s profile and share with friends… Let’s stop the dynamics of malicious activity!
If you want to know more about how ransomware acts on a system, senhasegura will promote the webinar “Dissecting Ransomware Attack – Protecting your Company Accesses” on the October 26th at 3pm (CET), with a live demonstration by Cybersecurity Researcher, Filipi Pires, and by senhasegura’s System Analyst, Gabriel Oba, who will clarify all doubts with a highly conscious approach to the use of devices and what is the adequate product to mitigate the risks of this type of malicious attack.
About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.
Senhasegura strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.