logo

Ransomware Malware: A Walkthrough and Real World Example

   

Added on  2022-12-23

5 Pages1180 Words59 Views
 | 
 | 
 | 
Running head: CYBER SECURITY
Cyber Security
Name of the Student
Name of the University
Author Note
Ransomware Malware: A Walkthrough and Real World Example_1

CYBER SECURITY
1
Introduction:
In the aspect of cyber security there are various types of viruses and malware which can
badly affect the computer systems and the users of it. In this aspect ransomware is one of the
malware which can badly affect the computer systems (Moore, 2016). In this aspect ransomware
malware will be discussed and a detailed walkthrough will be developed regarding how this
malware operated in the real time environment.
Walkthrough of the Ransomware Malware:
The ransomware malware operates within the real world by following four stages. These
four stages are the targeting, distribution, encryption and recovery. In the following section all of
these four stages are described.
Targeting: Targeting is the first phase for the ransomware malware. In this step the
ransomware attacker finds their potential victims and prepares a method for execution of
the attack (Brewer, 2016). The most common method of executing this attack is sending
an email to the victim attaching the malware into it. Distribution: In the distribution phase of the attack the ransomware malware is installed
in the system of the victim. For installing this threat into the system a new type of
technique is used which is known as the clickless threats. In this way, the malware got
installed in the system without the acknowledgement of the user. In this way ransomware
malware is distributed among the systems. Encryption: The third stage of the ransomware attack is the encryption. After successful
installation in the victim’s system now it’s the time for encrypt all the files and folders
Ransomware Malware: A Walkthrough and Real World Example_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malware in Computer System: WannaCry Ransomware and Mirai Attack
|8
|1304
|441

Ransomware Attack and its Impact
|13
|2416
|74

Wannacry: A Cyber-Warfare in Modern Times
|11
|2953
|469

Cyber Security WannCry Attack Case Study 2022
|11
|2314
|16

WannaCry Ransomware Attack
|6
|1159
|110

IT Security Management
|12
|2958
|324