Analysis of Ransomware: Threats, Impacts, and Mitigation Strategies

Verified

Added on  2022/08/24

|13
|561
|21
Report
AI Summary
This report provides an overview of ransomware, a type of malware that restricts user access to infected systems and demands ransom payments, typically in cryptocurrencies like Bitcoin. The report details the primary methods of ransomware distribution, including phishing emails and malicious websites, and highlights the increasing prevalence and sophistication of ransomware variants, such as CryptoLocker and GameOver Zeus. It also discusses the various impacts of ransomware, including data loss, operational disruptions, and reputational damage, particularly for businesses. The report emphasizes the importance of a comprehensive data backup and recovery plan, regular software updates, and cautious email practices to mitigate ransomware threats. Overall, the report stresses the importance of proactive measures for protecting against ransomware attacks.
Document Page
Computer and
Network Security
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Ransomware – The Reality
Ransomware is a sort of malware that put up variants of attacks
on computer systems while limiting user access to the infected
systems.
The attackers usually demand ransom between $200-$400 from
victims and it needs to be paid in the different type of virtual
currency such as Bitcoin as here the transactions one making
using these currency are totally anonymous.
Document Page
Ransomware – The Reality
The main sources through these attack are done for spreading
ransomware includes phishing mails and infected website. These
sources have some sorts of malicious attachment and when a
user goes on the website, malware is automatically downloaded
without the intimation of user.
Document Page
Increase In Variants of
Ransomware
The attackers with an average ransom of $200 gain $394, 400
per month and their financial success has likely led attackers to
come up with different ransomware variants.
Some of more desctructive ransomware variants include
CryptoLocker, CryptorBit and Xorist.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Increase In Variants of
Ransomware
The previously mentioned variants not only impact files on the
infected device, however also on the content of shared or
networked drives. Taking an example of an attack in early 2016,
Locky (a ransomeware variant) infected systems fit in healthcare
systems in the United States and New Zealand.
Document Page
Link of Ransomware and
Malware
The close relation amid ransomware and various sorts of
malware were verified via the latest botnet disruption on
GameOver Zeus, which also found to be effective against
CryptoLocker. GameOver Zeus is a variant of the Zeus Trojan that
is used for stealing various types of data.
Document Page
Threat You Should Aware As Of
Ransomware
Home users are not only the targets of attackers but also various
businesses and NGOs leading to several negative consequences
such as –
I. Permanent or temporary loss of proprietary or sensitive
information such as clients records, account information and
associated files.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Threat You Should Aware As Of
Ransomware
II. The next impact of ransomware on businesses is the disruption
to constant operations that cause disapproval to clients as well as
employees.
III. Ultimately, it also creates potential harm to a company
reputation and therefore, increases the gap between investors and
company executives.
Document Page
How To Get Protection From
Ransomware
The impact of Ransomware can be devastating to a business or for
an individual and it can be challenging to recover lost data or
information. With following ways, you can minimise the extent of
threat.
The first thing is to make a complete data backup and recovery
plan to local servers and hard disk as network linked backups
can also be impacted as of ransomware.
Document Page
How To Get Protection From
Ransomware
One should maintain their software and operating system
updated with the recent patches provided by vendor as it will
decrease the number of useful entry points accessible to the
hacker.
One should also not follow uninvited web links in e-mails while
eluding enabling macros from e-mail attachment.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Any Queries or Want More Tips
For Protection
Name –
Contact Number –
Email-ID –
Care to be aware !
Document Page
References
us-cert.gov. (2016). Alert (TA16-091A). Retrieved from
https://www.us-cert.gov/ncas/alerts/TA16-091A
chevron_up_icon
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]