The surprising thing is anyone can make it in the dark web, all you have to do is pay 25% of the money generated to the authors. According to Fabian Wosar, a security expert via Betanews, "The first infection method is nothing out of the ordinary, to lure slightly over the use of spam e-mails to victims into installing the ransomware. Delivered as a compressed RAR file , Ransom32 self-extracts and uses WinRAR is scripting language for configuring the malware to launch at startup, the establishment of a connection to a command and control server "using the supplied Tor client. Files are encrypted and a ransom note is issued, warns that the cost of decoding files will increase as time passes.
So what can you do to protect yourself? Unfortunately, because anti-virus software manufacturers have been slow to push definitions that detect Ransom32, you have little help from them, what you can do is:
Have a backup strategy in place.
Do not access .zip attachments in e-mails from unknown senders.
Do not click on links in emails from unknown senders. If you can see the actual link, copy and test the use of this website.
Avoid questionable websites and never click on links to unknown web.
Beware, don't fall a victim
No comments:
Post a Comment