Question

In: Computer Science

Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant...

Research a Ransomware attack. In your discussion include: victim of attack, vector of infection, symptoms, variant of ransomware used, number of systems affected, cost of ransom (was it paid?), were the systems recovered (from backup or decrypted), etc.? Do you agree with the actions taken by the victim in response to the attack?

Solutions

Expert Solution

ransomware attack:-ransomware is a malicious software that infect our computer and impede the users access to it until a ransom is paid to unlock it.The ransom demanded for the every individual varies greatly depending on the information that they have.More sensitive information more ransom is demanded.

  • ransomware attack is defined as a type of malware/malicious software is installed into your computer and this software will encrypt all your personal data and your computer gets locked until you pay some ransom to them.if you pay the ransom then they will give you the decryption key to unlock your system and money should be paid in a limited time which they provided.Otherwise,the decryption key gets expired and your gets locked.
  • victim of attack:-The person who is affected by the ransomware is known as a "victim".
  • vector of infection:-The majority of the ransomware is installed into our system mainly by the links that we are clicking without having proper understanding about what the link says,spam emails,opening the malicious websites.Malware also spreads through the malvertising and drive by downloads which doesn't need user to get involved inorder to install the ransomware.We doesn't know when our system gets affected by all these we can get affected.
  • symptoms:-
  1. The victim losses his/her files and also should pay the ransom inorder to get back their files.
  2. If the victim system is blocked then he need to pay the ransom immediately to get the decrypt key to again access the system.
  3. The victim losses the productivity.
  4. The victim losses the IT costs,legal fees,network modifications.
  • variant of ransomware used:-The ransomware used to was the CryptoLocker botnet,which is the oldest software.The CryptoLocker botnet is the most destructive form of ransomware because it has the strong encryption algorithms and so it is hard to decrypt the files .
  • number of systems affected:-The number of systems infected was only one.The files in the system was encrypted.The data is hijacked.
  • cost of ransom:-The cost of ransom was minimum $200-$400 but they have got the demand to pay $200.Immediately reacted to the demand and  paid the ransom and they had given me the decryption key.By using the decrypt key they got back their files.
  • Yes,i agree with the actions taken by the victim in response to the attack because he/she responded to the demand quickly and got back their files and solved their issue

Related Solutions

Explain the differences in the types of hepatitis. Include the symptoms, source of infection, treatment of...
Explain the differences in the types of hepatitis. Include the symptoms, source of infection, treatment of each, and the use of vaccines.
research about Fungal infection common in Oman and its emergence The research report will include the...
research about Fungal infection common in Oman and its emergence The research report will include the following information about Fungal infection a.MOT( mode of transmission) b.CA (causative agent) c.signs and symptoms of infection d.laboratory test e.treatment or antimicrobial therapy f. appropriate measures to prevent or control the infection.
Discuss correlational and experimental research. Provide an example of each. In your discussion, include an explanation...
Discuss correlational and experimental research. Provide an example of each. In your discussion, include an explanation of why correlational research is sometimes preferred over experimental research. Then, explain what the value of a correlation indicates.
For this Discussion, you will research the minimum wage laws. Your response must include a discussion of both the advantages and disadvantages of minimum wage laws.
For this Discussion, you will research the minimum wage laws. Your response must include a discussion of both the advantages and disadvantages of minimum wage laws.For example, you might consider these differing perspectives as you approach your research:Perspective One: The U.S. Department of Labor has imposed a minimum wage since 1938. Most states mandate minimum hourly wage rates, too. Minimum wage legislation inhibits an employer from setting wage rates below the directed amount. Although the goal is to help workers,...
Present a through discussion of wireless networking. Include WiFi, Bluetooth, and Cellular in your discussion.
Present a through discussion of wireless networking. Include WiFi, Bluetooth, and Cellular in your discussion.
Discuss the risk-free rate. In your discussion include you should include a definition, how it is...
Discuss the risk-free rate. In your discussion include you should include a definition, how it is calculated and how and when it is used in finance.                                 Compare and contrast ordinary and preference shares and discuss how their return and value can be calculated.              
Beriberi is caused by not getting enough thiamine in your diet. Symptoms include swelling, tingling, or...
Beriberi is caused by not getting enough thiamine in your diet. Symptoms include swelling, tingling, or burning sensation in the hands and feet, confusion, difficulty breathing (from fluid in the lungs), and uncontrolled eye movements (called nystagmus).
For this concept map, your main topic will be urinary tract infection (UTI). Subtopics should include:...
For this concept map, your main topic will be urinary tract infection (UTI). Subtopics should include: • Locate—list common assessment findings or observations associated with UTI • Communicate—list questions you would ask the patient related to UTI • Medicate—list expected treatments for UTI • Educate—list pertinent patient education items related to UTI and/or its prevention • Advocate—list items you would request from the physician or advocate for concerning UTI You are not limited to these subtopics, but these subtopics must...
Describe the water cycle in detail. Include in your discussion the stocks of the cycle and...
Describe the water cycle in detail. Include in your discussion the stocks of the cycle and the relative abundance of water in each of the stocks. Also discuss the flows of the cycle and the various ways by which water move through the stock. Then, describe the water cycle in Indiana, and the important components of that cycle. Discuss how the water cycle has created features of Indiana's landscape, including streams, groundwater, and karst. Include specific examples in your discussion.
find an article with an interesting statistic. Include the link to the article in your discussion...
find an article with an interesting statistic. Include the link to the article in your discussion post. Describe the research methodology and statistic conclusions. Discuss why you found the article interesting and anything that you would change in the research
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT