Page 50 - Cyber Warnings
P. 50
RANSOMWARE - A NEW BATTLE IN INFORMATION SECURITY
As reported by French security researcher "Kafeine," who has a good write-up and several
screenshots, a type of malware named Ransomware encrypting data and asking the victim for
a ransom is growing and becomes a big concern in data loss. When intruding into a computer,
this malware will begin to encrypt data. With such a strong encryption method, the decryption
seems to be impossible unless the victim accepts to pay a ransom to the hacker for the
decryption key.
RANSOMWARE AND RISKS OF DATA LOSS
Ransomware is not a newly born malware. Actually, ransomware has been active since 1989
but booming only in recent years due to a side effect of convenient electronic payment methods
together with modern encryption technologies. Ransomware became a dangerous and common
weapon used to attack for a ransom in 2011.
About 60,000 new patterns were detected in the third quarter of year 2011, and this number
increased sharply in the third quarter of year 2012 with over 200,000. Within the period from the
third quarter of year 2014 to the first quarter of year 2015, the number nearly quadrupled. This is
an alarming figure.
Ransomware primarily spreads out via email, as of the present time there are statistically a
massive of computers in the world having received spam emails with ".zip" file attachments.
When opening this file, the victimized computer will be controlled and data files will be
encrypted.
Figure 1: Ransomware intruded into a PC and asked for a ransom (Ransomware in English by
French security researcher "Kafeine")
There has not been any official statistics on number of victims in the world. However, this type
of malware is spreading out quickly with unforeseen occurrence.
ZombieZERO – EFFECTIVE SOLUTION AGAINST RANSOMWARE
Once the data is infected with ransomware, it is nearly impossible to restore them unless
decryption key is provided by the hacker. Hence, dealing effectively with ransomware should
50 Cyber Warnings E-Magazine – April 2016 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide