Providing Free and Editor Tested Software Downloads
< HOME | TUTORIALS | GEEK-CADE| WEB TOOLS | YOUTUBE | NEWSLETTER | DEALS! | FORUMS | >

MajorGeeks.com - What about a nice warm cup of Geek?

Software Categories

All In One Tweaks
Android
Antivirus & Malware
Appearance
Back Up
Browsers
CD\DVD\Blu-Ray
Covert Ops
Drivers
Drives (SSD, HDD, USB)
Games
Graphics & Photos
Internet Tools
Linux Distros
MajorGeeks Windows Tweaks
Multimedia
Networking
Office & Productivity
System Tools

Other news

· How To and Tutorials
· Life Hacks and Reviews
· Way Off Base
· MajorGeeks Deals
· News
· Off Base
· Reviews




spread the word

· YouTube
· Facebook
· Instagram
· Twitter
· Pintrest
· RSS/XML Feeds
· News Blur
· Yahoo
· Symbaloo

about

· Top Freeware Picks
· Malware Removal
· Geektionary
· Useful Links
· About Us
· Copyright
· Privacy
· Terms of Service
· How to Uninstall

top downloads

1. GS Auto Clicker
2. Macrium Reflect FREE Edition
3. Smart Defrag
4. Visual C++ Redistributable Runtimes AIO Repack
5. Visual C++ Runtime Installer (All-In-One)
6. McAfee Removal Tool (MCPR)
7. MusicBee
8. Rufus
9. K-Lite Mega Codec Pack
10. Sergei Strelec's WinPE
More >>

top reads

Star How to Disable 1-Click Ordering on Amazon (and Avoid Surprise Charges)

Star How to Fix Shallow Paint Layer Depth in Bambu Studio

Star Aviator Betting Game Secrets: Unlock 97% RTP & Triple Your Wins

Star Windows Recall: What It Is, Why Hackers Will Love It, and How to Stay Safe

Star Star Trek Fleet Command Promo Codes: Redeem Codes for Free Shards, Blueprints And Resources

Star How To Use VLC Media Player to Trim Video Clips

Star What Is the $WinREAgent Folder and Can I Delete It?

Star Swear Your Way to Better Search Results

Star How to Get a Dark Start Menu and Taskbar in Windows 10 & 11

Star Enable, Disable, Manage, Delete or Create a System Restore Point


MajorGeeks.Com » News » February 2015 » Ransomware evolving

Ransomware evolving


Posted by: Timothy Weaver on 02/10/2015 03:02 PM [ comments Comments ]


Ransomware authors are streamlining their malware in the hopes to attack more users.



The biggest threat in ransomware is CryptoWall, which encrypts a wide range of files and demands that victims pay a ransom in Bitcoin cryptocurrency to recover them.

It is proving harder to track down because it uses the Tor and I2P anonymity networks. According to Cisco Systems, the latest version, CryptoWall 3.0, was launched in January after a two-month break by its creators. One notable change: it no longer bundles local privilege escalation exploits.

Privilege escalation exploits allow attackers to execute malware programs with administrator or system-level privileges instead of using the victim’s local user account, which might be restricted.


And it appears as though the malware authors plan to rely more on Web-based drive-by download attacks to infect systems. Drive-by download attacks are launched from compromised websites or through malicious ads and usually exploit vulnerabilities in browser plug-ins like Flash Player, Java, Adobe Reader or Silverlight. However, this does not mean they have abandoned email methods.

F-Secure reported Monday that they’ve observed a significant increase this month in infections with another file-encrypting ransomware program called CTB-Locker. CTB-Locker is most commonly spread through emails with a malicious zip file attachment.

“The reason why this variant is more dangerous than its predecessor is that it generates unique keys for each infected device, making it harder to decrypt infected devices,” Avast researcher Nikolaos Chrysaidos said in a blog post Tuesday.

Security researchers advise against paying such ransoms to cybercriminals, because there’s no guarantee of getting the decryption key and because it encourages them to continue their scheme.

Files should be backed up to drives or network shares that are only temporarily connected to the computer or that require a username and password to be accessed. That’s because ransomware programs will also encrypt files from folders accessible over the network if they can write to them.


« Random Photo: Brute-force hack detected · Ransomware evolving · It's a Sign (5 Photos) »




Comments
comments powered by Disqus

MajorGeeks.Com » News » February 2015 » Ransomware evolving

© 2000-2025 MajorGeeks.com
Powered by Contentteller® Business Edition