Ransomware Protection

Ransomware Protection2017-09-21T15:56:12+00:00


What is Ransomware?

[/vc_column_text][vc_separator border_width=”4″][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”2294″ img_size=”full” alignment=”center”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Ransomware, a type of malware that encrypts data on infected systems, has become a lucrative option for cyber extortionists. When the malware is run, it locks victim’s files and allows criminals to demand payment to release them. This malware sometimes marks the files for permanent deletion or publication on the internet. The perpetrators then demand a payment (usually in untraceable cryptocurrency like Bitcoin) for the private key required to decrypt and access the files.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner width=”1/2″][vc_single_image image=”2299″ img_size=”full” alignment=”center”][/vc_column_inner][vc_column_inner width=”1/2″][vc_column_text]

Most Ransomware uses the AES algorithm to encrypt files, though some use alternative algorithms. To decrypt files, cyber extortionists typically request payment in the form of Bitcoins or online payment voucher services, such as Ukash or Paysafecard.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_row_inner][vc_column_inner][vc_text_separator title=”How Ransomware is Spread?”][vc_column_text]

Spam is the most common method for distributing Ransomware. It is generally spread using some form of social engineering; victims are tricked into downloading an e-mail attachment or clicking a link. Fake email messages might appear to be a note from a friend or colleague asking a user to check out an attached file, for example. Or, email might come from a trusted institution (such as a bank) asking you to perform a routine task. Sometimes, Ransomware uses scare tactics such as claiming that the computer has been used for illegal activities to coerce victims. Once the user takes action, the malware installs itself on the system and begins encrypting files. It can happen in the blink of an eye with a single click.

[/vc_column_text][/vc_column_inner][/vc_row_inner][vc_text_separator title=”Common Types Of Ransomware”][vc_row_inner][vc_column_inner width=”1/3″][vc_icon icon_fontawesome=”fa fa-file-word-o” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506048085866{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048435280{margin-top: -20px !important;}”]

CryptoLocker is distributed via exploit kits and spam. When the malware is run, it installs itself in the Windows User Profiles folder and encrypts files across local hard drives and mapped network drives. It only encrypts files with specific extensions, including Microsoft Office, OpenDocument, images and AutoCAD files. Once the dirty work is done, a message informing the user that files have been encrypted is displayed on said user’s screen demanding a Bitcoin payment.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_icon icon_fontawesome=”fa fa-key” color=”custom” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506048127409{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048444528{margin-top: -20px !important;}”]

The initial version of CryptoWall used an RSA public encryption key but later versions (including the latest CryptoWall 3.0) use a private AES key, which is further masked using a public AES key. When the malware attachment is opened, the CryptoWall binary copies itself into the Microsoft temp folder and begins to encode files. CryptoWall encrypts a wider variety of file types than CryptoLocker but, when encryption is complete, also displays a ransom message on a user’s screen demanding payment.

[/vc_column_text][/vc_column_inner][vc_column_inner width=”1/3″][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-fire” color=”custom” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506048186145{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048456872{margin-top: -20px !important;}”]

Locky is a relatively new type of ransomware, but its approach is familiar. The malware is spread using spam, typically in the form of an email message disguised as an invoice. When opened, the invoice is scrambled, and the victim is instructed to enable macros to read the document. When macros are enabled, Locky begins encrypting a large array of file types using AES encryption. Bitcoin ransom is demanded when encryption is complete.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css=”.vc_custom_1505867739580{padding-top: 60px !important;padding-bottom: 60px !important;}”][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon icon_fontawesome=”fa fa-terminal” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506048254769{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048467760{margin-top: -20px !important;}”]

WannaCry uses SAMBA to connect remotely and add their malware to the exploited machine. Once WannaCry has gotten onto the network, it can spread like a worm If the ransom goes unpaid, after a couple of days it increases, and after a slightly longer amount of time the decryption algorithm is deleted and data is lost.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon icon_fontawesome=”fa fa-bug” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506048291369{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048475735{margin-top: -20px !important;}”]

TeslaCrypt is another new type of ransomware on the scene. Like most of the other examples here, it uses an AES algorithm to encrypt files. It is typically distributed via the Angler exploit kit specifically attacking Adobe vulnerabilities. Once a vulnerability is exploited, TeslaCrypt installs itself in the Microsoft temp folder. When the time comes for victims to pay up, TeslaCrypt gives a few choices for payment: Bitcoin, PaySafeCard and Ukash are accepted here. And who doesn’t love options?

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][vc_column width=”1/3″][vc_row_inner][vc_column_inner][vc_icon type=”linecons” icon_linecons=”vc_li vc_li-lock” color=”custom” size=”lg” align=”center” custom_color=”#1974d2″][vc_column_text css=”.vc_custom_1506049728878{margin-top: -20px !important;}”]


[/vc_column_text][vc_column_text css=”.vc_custom_1506048485312{margin-top: -20px !important;}”]

TorrentLocker uses a technique called process hollowing, in which a Windows system process is launched in a suspended state, malicious code is installed, and the process is resumed. It uses explorer.exe for process hollowing. This malware also deletes Microsoft Volume Shadow Copies to prevent restores using Windows file recovery tools. Like the others outlined above, Bitcoin is the preferred currency for ransom payment.

[/vc_column_text][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row][vc_row css=”.vc_custom_1506049444691{padding-top: 40px !important;padding-bottom: 40px !important;}”][vc_column][vc_column_text]

Ransomware Protection and Recovery Solution

[/vc_column_text][vc_text_separator title=”PROTECT AGAINST RANSOMWARE”][vc_column_text css=”.vc_custom_1506047654443{padding-top: 30px !important;}”]

Ransomware is constantly evolving, even the best security software can be breached. This is why a secondary layer of defense is critical for businesses to ensure recovery in case malware strikes: Backup!


As with most disaster recovery scenarios, the best approach is to plan and prepare. While end user education and endpoint and perimeter protection solutions are critical components of such a plan, they alone are not enough. Most businesses already employ these solutions, and Ransomware still gets through. To comprehensively protect your business, you need more than white and blacklists. You need a way to quickly detect and recover from the attacks.

Hexistor Appliance with Ransomware detection and point in time rollback, is designed to identify an attack, notify administrators, and recover from just these scenarios. Within minutes, it can be as if the Ransomware never happened. Say goodbye to Ransomware and other disasters, and hello to simple preventative measures provided by Hexistor.

[/vc_column_text][/vc_column][/vc_row][vc_row full_width=”stretch_row” equal_height=”yes” css=”.vc_custom_1506051391951{margin-bottom: 10px !important;border-bottom-width: 10px !important;padding-bottom: 10px !important;background-color: #1974d2 !important;}”][vc_column][vc_column_text]

Get Protected with Hexistor

[/vc_column_text][/vc_column][/vc_row][vc_row css=”.vc_custom_1506051413871{padding-top: 10px !important;padding-bottom: 60px !important;}”][vc_column][vc_column_text css=”.vc_custom_1506051350546{padding-top: 30px !important;}”]

The only sure way to resolve a ransomware attack is to restore the infected systems, effectively turning back the clock.

[/vc_column_text][vc_row_inner][vc_column_inner width=”1/2″][vc_btn title=”OUR SOLUTION” style=”custom” custom_background=”#1974d2″ custom_text=”#ffffff” shape=”round” align=”center” link=”url:https%3A%2F%2Fhexistor.com%2Fsolution%2F|||”][/vc_column_inner][vc_column_inner width=”1/2″][vc_btn title=”CONTACT US” style=”custom” custom_background=”#1974d2″ custom_text=”#ffffff” shape=”round” align=”center” link=”url:https%3A%2F%2Fhexistor.com%2Fcontact%2F|||”][/vc_column_inner][/vc_row_inner][/vc_column][/vc_row]