The wave after wave has risen again, and ransomware has undoubtedly become a hot topic in 2017. Let's review the major events of ransomware this year:
In May, the "wannacry" ransomware swept the computer files of university students in many universities in China, and the United States, Spain, Russia, and the United Kingdom were attacked.
The Petrwrap ransomware virus raged in June, and it was another wave of large-scale and organized attacks. Many governments, banks, and power industries suffered. Even Ukraine's nuclear power plants were spared.
In October, "Bad Rabbit" ransomware once again captured many European and American countries, affecting government, education, transportation and many other industries.
Ransomware is like a robber, holding user data very explicitly in exchange for benefits, and even receiving ransom and tearing the ticket. Ransomware threatening ransomware is once again a wake-up call for the security industry.
In response to the concentrated outbreak of ransomware this year, Mechuang specially invited senior experts who have many years of security work experience and have served many international giants to analyze the ransomware in detail for everyone, so that everyone can understand the ransomware more fully. More targeted deployment of ransomware protection.
Regarding the origin, harm, spread, and protection of ransomware, it is enough to read this article!
Introduction to ransomware
Ransomware refers to malicious software or malicious code that encrypts information such as documents, photos, and music on personal computers. Users must pay a fee (or ransom) to decrypt and redeem these files. It has quickly become one of the most profitable types of malware today, earning an illegal $ 1 billion per year.
Ransomware usually enters a computer or network through the Web or mail. The web, ransomware can sneak in by providing infected advertisements (called "malicious advertisements") of malicious software. When users browse sites containing malicious advertisements, they will automatically download the malware or redirect them to the exploit package; mail, Ransomware uses phishing or spam to gain a foothold. As long as the user clicks on a link or opens an attachment in a phishing or spam email, the ransomware can download and control its command and control server.