JK PANORAMA VOL 3 ISSUE 1 JANUARY
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Imran Bashir Tantray<br />
Ransomware<br />
Malicious software for RANSOM<br />
A global problem which we face in every passing year ransomware used to spread<br />
current scenario is “RANSOMWARE”.A real with different tactics. Like in 2012 ransomware<br />
threat which can disrupt or affect you anytime variants played an audio recording using the<br />
and in any part of the world.Its attacks are victims native language and anot-her one<br />
independent of your profile as it never matters bearing a fake digital certificate.In late<br />
for the attacker's that who the host is.As the 2013,ransomw-are exhibited a new behavior<br />
attacks are globally random so anyone can have and was named as “cryptolocker”. In 2014<br />
the taste of it. “RANSOMWARE” is a type of TROJ_CRIBIT.A and TROJ_CRIBIT.B<br />
software,maliciously designed to attack the emerged. In 2015 ra-someware was spread by<br />
users and hijacks their computer. During the “Angler exploit kit”.In 2016 Locky(RAattack<br />
the files in the computer are encrypted NSOM_Locky.A) was discovered and in April<br />
and the access is denied to users unless and until 2016 “JIGSAW” e-merged with innovative<br />
they pay a “RANSOM”(money paid for the routine. In may 2017 malicious worm<br />
freeing of a hostage).Due to encryption of the “wannacry/WCRY” emerged to spread<br />
files,it can be practically impossible to reverse ransomware.The attack by RANSOMWARE<br />
or crack the files without the original encryption using wannacry began on Friday,12 may<br />
key which only the attackers have access to.The 2017.By and large over 200,000 victims and<br />
restoration of encrypted files is only possible on more than 300,000 computers got infected as a<br />
payment of large amount of money as per their outcome of this attack. There are no special<br />
demand.The m-otive for ransomware attack is means by which this worm spreads,it all h-<br />
monetary as this is the only atta-ck in which a appens in a usual way.when a user is operating<br />
victim is notified and than instructed for on a computer, he/she is always one or two clicks<br />
recovery. The attackers are much vigilant and away from this attack.Sourc-es of ransomware<br />
are capable to protect their criminal identity by infection are the same as for usual computer<br />
demanding virtual payment.To decrypt the viruses i.e through email attachments and<br />
encrypted files,ransomware demand $300-$600 infected files downl-oaded with multimedia<br />
via bitcoin crptocurrency.This is a cyber attack from malicious websites. Mostly 'phish-ing'<br />
in which “WANNACRY WORM” is used and technique was used to distribute this malware.In<br />
infiltration is done. The unwanted and harmful phishing a person receives email which seems<br />
attack initially started way back in 2005- from a trusted source.Whe- n a click is done on<br />
2006,when in Russia several cases of the link in the email, malware like ransomw-are<br />
ransomware infection were found for the first gets downloaded in the system. But on 12 may<br />
time.As per report published by 'trend micro' 2017 infecti-on was likely through an exposed<br />
about a ransomware case in 2006 in which a vulnerable SMB port rather than email phishing<br />
ransomware variant (TROJ_CRYZIP.A) zipped as initially assumed.Once executed in the<br />
some file types before overwriting the original system, ransomware either locks the computer<br />
ones.Initially particular file types like screen or encrypt predetermined files.In the<br />
Doc,XLS,JPG,ZIP,PDF were encrypted by screen lock case a full screen image or<br />
ransomware.But with the passage of time its notification is displayed on the infected systems<br />
ability to encrypt many different types of files screen which prevents the victim from using<br />
gained momentum. Initially limited to Russia, their system.In the encryption type ransomware<br />
ransomware soon found its way to other prevents a-ccess to files like documents and<br />
countries across Europe due to its popularity and spreadsheets. Ransomware is considered as<br />
profitable business model fro-m there on with “scareware” as it forces users to pay a fee or<br />
16<br />
January 2018