In: Computer Science
Case Study 1: Recent attacks
Case Study 2: Crypto-malware Attacks
Use the Internet to research some of the recent different crypto-malware ransomware attacks.
Case Study 1: Please mention the attack being referred to.
Case Study 2:
Define Crypto-malware Attacks and list some of them.
Crypto-malware ransomware is a type of harmful program that encrypts files stored on victim's device in order to extort money from victim. These are malwares which holds data as hostage. The ransomware are increasing every year.
Here are some of the biggest attacks : WannaCry (2017), SamSam(2015), SimpleLocker(2015), TeslaCrypt (2016)
What do they do?
It essentially takes the files hostage and in return demands a ransom in exchange for the decryption key needed to restore the files. It scrambles the file to make it unreadable. To restore it to normal use, a decryption file will be needed.
There are some malwares which encrypt specific types of files. While others encrypt many different file types.
However, there's a malware which directly encrypts Master Boot Record (MBR) which is special computer program that loads on boot, allowing all other programs to run. After the encryption is complete, the crypto-ransomware will display a message containing the ransom demand. The amount will vary ans is accepted in Bitcoins or a similar digital cryptocurrency.
Why are they so successful?
There are three reason:
How are they being spread?
The files received can't directly be triggered, they need to be opened. This is where victim is tricked to open the file.
What can users do to protect themselves?