Wednesday 9 February 2022

The Future of Ransomware: Are We Prepared?

My Geek ScoreWe’ve seen the rise of ransomware for years. It’s a simple concept that can be expressed in a very straightforward way.

A virus is designed to infect your computer and then not allow you to do anything. There are many different types of ransomware, but the most common forms are those that encrypt files or spread through email attachments.
Brenntag ransomware attack has been in the news recently. This malware mainly targets Internet of Things (IoT) devices, but can also target mobile devices.
It all started in the early 1990s when a group of developers and hackers called “The Untold Story” faced a challenge with the CryptoLocker software. The authors had been working on a new way to encrypt files and demanded a $20,000 ransom for decryption.
They had also created an automated system to do so, which was likely why they were willing to pay the ransom; however, this further entrapped their users into paying ransoms before they could get back control over their devices. The creators even made it so that if they were caught, they would face jail time or even the death penalty.
If you don’t think that those are scary enough reasons for you to pay the ransom, imagine how many innocent people have paid for such services?
There are many different ways in which ransomware has been used as well as paid for by malicious individuals and organizations alike (or perhaps it is these organizations who use ransomware). Some examples include:
A hacker might use ransomware on an unsuspecting victim with little to no intention of ever meeting them in person (e-mailing them from Russia) A government might use ransomware on citizens and businesses without their consent An organization might use ransomware in order to gain access to sensitive data An organized crime group might use ransomware as part of their business model
These methods aren’t just limited only to criminals either; there are legitimate companies like CyberArk who will take money too! However, it should be noted that not all ransoms are legitimate; there is also a gray area between legitimate and fraudulent ransoms which can be determined based on how much money is being asked in order for access or restoration of files or other important data/content.
Related links: https://diigo.com/0nftvh
https://telegra.ph/Brenntag-Ransomware-Attack-02-10
https://wke.lt/w/s/s9DpPf
https://bookmarkingpage.com/brenntag-ransomware-attack/
https://www.minds.com/newsfeed/1338304746045313036?referrer=melissacreech
https://padlet.com/checkgeeks/Bookmarks
https://www.sbookmarking.com/story/brenntag-ransomware-attack
https://www.adlandpro.com/ad/42021426/Brenntag-Ransomware-Attack__Internet_332__around_hillsidenj.aspx#.YgRdZN9By3A
https://www.jivanchi.com/in/business-listing/internet-web-services/brenntag-ransomware-attack_i11056.html
https://www.classifiedads.com/volunteer/8c4w3p55f3w42
https://www.organesh.com/se/classifieds/35651/50938/brenntag-ransomware-attack
https://elizabeth.locanto.com/ID_5424338603/Brenntag-Ransomware-Attack.html&myads
https://freead1.net/ad/3461653/brenntag-ransomware-attack.html
https://www.topclassifieds.com/ads/767/posts/12/73/4434673.html
http://www.adsriver.com/1/posts/21/384/1431487.html
https://www.expatriates.com/cls/49860074.html

No comments:

Post a Comment

The Future of Ransomware: Are We Prepared?

My Geek Score :  We’ve seen the rise of ransomware for years. It’s a simple concept that can be expressed in a very straightforward way. A v...