Blog Layout

The Five ‘Whats’ and ‘Wheres’ of Ransomware

The O Team • 5 January 2023

The Whats.


Ransomware is a type of harmful software (malware) that infiltrates a machine and/or network and encrypts the data on it and then the ransomware family jump in:

 

1.     Scareware

Scares people to manipulate them into buying/downloading harmful software, such as fake antivirus, enabling malware access so attackers can steal personal or financial information.


2.     Encryptors

Holds data hostage until a ransom is paid. If you fail to pay, your data could be lost for good.

 

3.     Lockers

Locks users out, blocking access to data unless a ransom is paid. Victims typically see a lock screen displaying ransom details alongside a ticking timer to create a sense of urgency.

 

4.     Leakware (also called Doxware)

Aims to extort a ransom payment by threatening to leak sensitive and confidential data online.

 

5.     Ransomware-as-a-service (RaaS)

Non-technical criminals can obtain ‘ready to go’ ransomware code and release infection campaigns themselves.


The Wheres.


To avoid being a victim of ransomware, make sure you know how it can get in and then put in place the means to stop it.

 

1.     Phishing

Phishing emails (and SMS text messages) are the most common cause of ransomware infections – they contain a malicious link or a file that victims click on/download, opening the doors to harmful software.


2.     Malvertising

Malware is disguised as an advert and then appears on legitimate, often well known, websites. Clicking on any part of the advert can release the malware onto your device.


3.     Malicious Webpages

Infected URLs (web addresses) are getting more and more common and can look totally harmless as a link for you to click on –  one tell-tale sign is a mis-spelling of a business/product name in the URL (hover over links to reveal the full URL).


4.     Social Engineering

Cybercriminals pose as legitimate entities or people, such as police, delivery companies or head of a company, to trick you into sharing sensitive and private information, so they can use this to breach your systems. These fake interactions can be via emails, texts, social media or phone calls.


5.     RDP (Remote Desktop Protocol) Attacks

RDS is a Microsoft Windows OS function enabling multiple users to connect to a network/server remotely. Hackers infiltrate via RDP, gaining access to all your network/server data.


So how do you protect yourself and your business from the five ‘whats’ and ‘wheres’ of ransomware?

Prepare. Educate. Secure. Update.


Prepare

Make sure you don’t think ‘it won’t happen to us’ and that you have put measures in place to not only protect yourself against attacks, but to ensure you backup all data regularly and securely in case you are attacked.

 

Educate

The majority of attacks are enabled through human error – clicking on a malicious link or file. Regular training and keeping employees informed of the latest threats and how to deal with them is critical. Also, empowering people to inform you immediately (without fear of repercussion) if they do click on a link will go a long way to getting the issue rectified quickly, before too much damage is done.

 

Secure

Putting in the right levels and layers of protection is vital to cover all areas of vulnerability. Proactive services (such as remote monitoring) will identify and deal with threats before you are aware of them.


Update

Whatever security and protection you have in place, you must ensure that all updates and new releases are installed immediately and correctly to ensure you have the greatest level of protection. New malicious software and cyber threats appear every day so protection needs to be updated all the time.


More information and solutions can be found here >


Topics: Cyber security, ransomware, data protection, data security


Two toy businessmen looking at missing jigsaw pieces over the words 'dropdown menu'
by The Orbital10 Team 11 November 2024
Having trouble finding the sign out button in Windows 11? You’re not the only one! Luckily, Microsoft have listened… find out more here.
Laptop open with the Microsoft Edge icon on the screen
by The Orbital10 Team 26 October 2024
Trying to find your way through the Settings menu in Microsoft Edge might leave you overwhelmed but a new update is about to make it easier. Here we tell you how.
Computer screen showing data backup files that are getting corrupted
by The Orbital10 Team 21 October 2024
Your business data is backed up and recovery tools are in place. So, your data is safe, right? Sadly… not always. Here’s why we recommend backups are checked regularly..
Business man smacking his forehead after making a mistake
by The Orbital10 Team 7 October 2024
You’ve hit send on an important email - then you notice a typo. Windows 11 lets you spellcheck and autocorrect across most of its apps. Here we help you to set it up
Robotic AI arm holding a graphic of a robot and graphics of technology
by The Orbital10 Team 30 September 2024
Tried Microsoft Copilot yet? It’s a smart tool baked into the applications you use every day, that could save you time. Here are some cool ways it can help.
Person on laptop and using their smart phone to complete multi-factor authentication
by The Orbital10 Team 10 September 2024
Microsoft recently announced that all Azure sign-ins will soon require multi-factor authentication (MFA) to boost security. Even if you don’t use Azure, a cloud computing platform, this is something you should pay attention to. Because MFA is one of the simplest and most effective ways to protect your digital assets.
Man sitting with open laptop that has  the words 'installing updates' on the screen
by Orbital10 Team 2 September 2024
If you’re like most people, you probably find system updates a hassle. They take ages and those big downloads eat up precious bandwidth and storage. Good news then: Microsoft is about to make your life a whole lot easier with the upcoming Windows 11 24H2 update. It’s introducing something called ‘checkpoint cumulative updates.’ That might sound a bit technical, but don’t worry – it’s simple and very beneficial. Find out more in our blog post...
A cartoon lemon looking worried and upset, standing on a laptop
by Orbital10 Team 28 August 2024
Buying a used laptop can be a great way to save money. But it comes with risks. You need to be careful and thorough in your evaluation. Otherwise, you could end up wasting your money. You can’t only look at the outside when evaluating technology. This guide will help you understand what to look for when buying a used laptop (or desktop PC). These steps can keep you from losing money on a bad tech decision.
Business woman with magic powers holding a laptop
by Orbital10 Team 28 August 2024
Running a small business is a whirlwind. You juggle a million tasks and wear countless hats. You also constantly fight the clock. What if you could reclaim some of that precious time? Enter task automation. It’s your secret weapon for streamlining your workflow and boosting productivity. By automating routine and repetitive tasks, small businesses can gain many benefits. Such as freeing up valuable time and resources. Every minute saved can translate to increased productivity and profitability. This guide will walk you through the essentials of small business task automation. It’s designed to help you understand its benefits and identify tasks to automate. As well as choose the right tools and install automation effectively
Open laptop with blue screen and error message
by Orbital10 Team 27 August 2024
Imagine this: you walk into your office on a busy Monday morning, ready to tackle the week. But something's wrong. Computers are unresponsive. Phones are silent. The internet is a ghost town. Your business has come to a grinding halt – victim of an IT outage. It's a scenario every business owner fears. But beyond the initial frustration are expenses you may not immediately see. IT downtime carries hidden costs that can significantly impact your bottom line. Let's peel back the layers and expose the true price of IT outages.
More posts
Share by: