Ransomware is the refined piece of malware that is capable of blocking the access of a victim to his or her files. The solitary way for one to regain access to those affected files is to pay the ransom. There are actually two forms of ransomware in circulation:

One is the encrypting ransomware that incorporates the revolutionary encryption algorithm. It is carefully designed to block the system files and to demand payments to render the victim a key which will decrypt the blocked files. Samples of it are Locky, CryptoLocker and CryptoWall. The other kind is the Locker ransomware that locks the target user out of the OS that makes it hard and impossible to open the desktop or any app or file. The files arent’ encrypted in such case, but the attacker still asks for the ransom to get the affected computer unlocked.

A few locker versions could even affect the MBR or the Master Boot Record. The MBR is the part of the hard drive of a personal computer that enables the OS to boot up. At the time the MBR ransomware is used, the boot process will stop and will never be completed and there will be a ransome note that will be shown on the screen. The crypto-ransomware, as the encryptors are normally known, has been the most widespread one and the entire cyber security society is agreeing that it is the most worrisome and prominent cyber threat as of this point of time and it remained to be in that way for the past few years. 

Ransomware comes with major characteristics which set it aside from some other malware:

-It comes with unbreakable encryption, meaning you cannot decrypt the file alone. You will need to make use of the different decryption tools that were developed and introduced by the researchers and experts on cyber security. 

-It has the capability to encrypt all forms of documents, ranging from documents all the way to photos, audio files, videos and some other things which you might have on your personal computer.

-It could also scramble your filenames so you cannot determine which of your files was actually infected. It is among the social engineering tactics used in coercing and making the victim confused to pay the ransom. 

-It would display the image or the message that will inform you that your data was encrypted and that you need to pay a particular amount of cash to get that back.

-Normally, ransom payments come with time-limit so as to add a further mental constraint level to this extortion system. Going over the due date usually means the requested amount of cash will increase, yet it could also mean that the affected data would be destroyed and the owner will lost it permanently.

-It employs a complicated array of evasion tactics that will be undetected by the antivirus software.

-It could spread and infect some other computers over the local network, which results to further damage.

-It usually features data exfiltration functions and that means it could as well extract data from the infected PC.


So when you encounter a problem involving this, asking for help from the experts on cyber security will always be a must. 

at 23/08/2017, 13:46pm

Updated: at 02/09/2017, 16:57pm

Been read 15421 times

Similar Articles


CCleaner is the popular tools when coming to keeping your system clean from junk, temporary files, broken shortcuts, and other problem. CCleaner has been downloaded more than 2 billion times according to Avast, making it a popular target for...

What People wrote...