Cyber Extortion is a crime involving an attack or threat of attack coupled with a demand for money to avert or stop the attack. Simple understanding, it is similar to the concept of blackmailing in which victims are forced to pay to avoid its effect. Cyber Extortion can take many forms. The most common is denial of service (DoS) attacks against corporate websites. The attacker might initiate a ping storm and telephone the president of the company, demanding that money be wired to a bank account in a foreign country in exchange for stopping the attack. However in recent years, cybercriminals have developed new variant of ransomware which encrypts the victim's data. The extortionist's victim typically receives an email that offers the private decryption key in exchange for a monetary payment in Bitcoins or other digital currency. Cyber Extortion can be lucrative, netting attackers millions of dollars annually. Unfortunately, as with other types of extortion, payment does not guarantee that further cyber-attacks will not be launched.
Basically, it is any type of malicious program
or IT code whose objective is to infiltrate networks and computers to cause
damage, spy, and steal information. The most dangerous types of malware are:
It
blocks the PC, removing all user control, encrypts files and demands a
financial ransom to return them. |
It
takes advantage of a security fault or vulnerability in the communication
protocols to enter your computer. |
It
collects names, access details, passwords, and any type of information about
your company |
It
creates a false URL to obtain your data and steal your identity, with the aim
of stealing from your bank accounts. |
It
installs various applications so that hackers can control the computer. They
control your files and steal your confidential information. |
It’s
a computer process that penetrates your security to control and monitor it,
being able to continually extract information for business or political
means. |
It
tricks you with false promotions such as holidays or lotteries, then asks you
for money to access the “prize”. |
It
opens a “back door” to take control of your system. |
It
collects and sends all keystrokes completed by the user. |
It is
a program that remotely controls your PC |
|
|
Technical Services strongly advice users, do not give in to the cybercriminals’ blackmail because there is no guarantee that this will solve the problem. In fact, in many cases, the victim of the blackmailing has given over the amount demanded but without receiving the decryption key (or even a corrupted key). None of these outcomes can help get the kidnapped information back. It is also recommended to completely wipe all traces of malware from the computers by using the assigned antivirus. Moreover, as to prevent from becoming the victims, it is also recommended that you make backup copies of critical files every so often, just in case we can help to restore if your files are not recoverable due to ransomware attack.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.