Select Page
  • by Sarah
  • June 22, 2016

Apparently, a lack of security common sense still plagues businesses with 30 percent of phishing emails opened by campaign targets.Phishing is an attempt to steal sensitive information including usernames and passwords.

Ransomware, sometimes called scareware, is a type of malware that locks down infected machines, offering to unlock them only after a fee has been paid. Unfortunately paying the fee generally accomplishes nothing, instead only provides these criminals with what they are after.ransomeware_ clickfraud

We at want you to be aware of the risks associated with phishing and the types of ransomeware to be aware of.

#1) Locky: nickname of a new strain of ransomware, so-called because it renames all your important files so that they have the extension .locky. Not only does this ransomware rename your files, it scrambles them and allows only the perpetrator access to the decryption key. You can buy the decryption key from these criminals via the so-called dark web. Most ransomware, like Locky doesn’t just scramble your C: drive, but any files in any directory on any mounted drive that it can access, including removable drives that are plugged in at the time,or even shared networks.
#2) CryptXXX is particularly nasty because it not only encrypts local files (encrypted files have a .crypt extension), but also those on all attached storage shortly after the initial infection. The malware also has other capabilities beyond encrypting local files. Additionally its functionality is set to steal sensitive data, which is another big threat, even if the victim manages to decrypt the files. Find out more about this specific type of ransomware at: New Decryptor Unlocks CryptXXX Ransomware new decryptor unlocks cryptxxx

#3) Reveton falsely warns users they’ve broken the law and demands payment of a fine. Unfortunately, Reveton, has expanded its repertoire with a password stealing functionality, according to new research.

Some Quick Tips to protect yourself against ransomware:

  • Be cautious about unsolicited attachments.
  • Don’t enable macros
  • Segment the company network
  • Consider installing the Microsoft Office viewers. These viewer applications let you see what documents look like without opening them in Word or Excel itself.

Pin It on Pinterest