Friday , November 22 2024

How ransomware can infect your computer and how to avoid it

More than four in five organisations (82%) were manipulated using ransomware in 2022 according to Proofpoint’s 2023 Phishing report.

Cybersecurity expert VPN Overview reveals the ways in which ransomware can infect your computer and how to avoid it.

1. Phishing and email impersonations  

“Forces Penpals” exposed US and UK Military Social Network’s 1 Million Records

Renowned cybersecurity researcher Jeremiah Fowler uncovered a non-password-protected database having over 1.1 million records linked to Conduitor Limited (Forces Penpals)....
Read More
“Forces Penpals” exposed US and UK Military Social Network’s 1 Million Records

CVE-2024-51503
Trend Micro released updates for Deep Security Agent RCE

Trend Micro released a security update for Deep Security 20 Agent Manual Scan Command Injection RCE Vulnerability (CVE-2024-51503) that resolves...
Read More
CVE-2024-51503  Trend Micro released updates for Deep Security Agent RCE

Apple Releases Patch for two Actively Exploited Zero-Day

Apple released critical updates for its various products including for iOS, iPadOS, macOS, visionOS, and Safari to fix two zero-day...
Read More
Apple Releases Patch for two Actively Exploited Zero-Day

Maxar Space Data Leak, Company admit, Investigation ongoing!

Maxar Space Systems has verified a major data breach that exposed particular information of current and former workers. The breach...
Read More
Maxar Space Data Leak, Company admit, Investigation ongoing!

GitHub CLI Vulnerability Could Allow RCE

A security vulnerability (CVE-2024-52308) in the GitHub Command Line Interface (CLI) could allow remote code execution on users' devices. With...
Read More
GitHub CLI Vulnerability Could Allow RCE

“Sarcoma” ransomware group
Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

“Sarcoma” ransomware group attacked a well known Bangladeshi insurance company named "Popular life insurance company ltd". The threat actor keeps...
Read More
“Sarcoma” ransomware group  Hacker to disclose “Popular Life Insurance” 36 GB of stolen data

BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

Bug Hunt 2024, one of the largest cyber security competitions and conferences in Bangladesh, was successfully held at the ICT...
Read More
BugHunt 2024: A Milestone Cyber security Competition held at Dhaka

TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

A serious security flaw has been found in some TP-Link routers, potentially enabling hackers to remotely access the affected devices.The...
Read More
TP-Link DHCP Vulnerability Allow Attackers Takeover Routers Remotely

WSJ reports
T-Mobile hacked in massive breach of telecom networks

The Wall Street Journal reported on Friday citing people familiar with the matter that T-Mobile’s network was among the systems...
Read More
WSJ reports  T-Mobile hacked in massive breach of telecom networks

Palo Alto Networks Confirms critical RCE zero-day actively exploited

"Palo Alto Networks has observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall...
Read More
Palo Alto Networks Confirms critical RCE zero-day actively exploited

Phishing – sending emails with the purpose of obtaining personal information – is the most common form of cybercrime in 2023.

The UK had the highest number of people falling victim to phishing in 2022, averaging at 4783 for every million internet users, a 40% rise from 2020.

These cyber criminals may impersonate legitimate companies, such as the cryptocurrency app Bitcoin, before issuing a security alert in an attempt to lure you to a fraudulent site.

Once you have entered your security and account credentials, they will inject ransomware into your computer or network, gaining illicit access to your personal information.

2. Malicious advertising  

Cybercriminals can also spread ransomware through malicious online advertisements, a process otherwise known as malvertising.

In fact, there were 1251 potential malware advertisements reported between 1 March 2021 to 25 March 2022.

It’s important to note that malvertising does not require the user to take any action. You can unknowingly connect to malicious servers while you’re browsing on a trusted website.

These malicious servers record information about your device and location. Once malware is sent to your computer, for example, your personal information can then be held at ransom.

3. Exploiting vulnerabilities  

Exploit kits – toolkits which use codes to exploit vulnerabilities in a system – are often used by cybercriminals.

These kits work by identifying security gaps and distributing malware. In turn, your personal information can be held at ransom.

There are multiple ways exploit kits can infect your computer, including redirecting you to compromised webpages or prompting you to download malicious content.

4. Social engineering  

Cybercriminals can also obtain personal information through human interactions. This manipulation tactic is known as social engineering.

They are likely to pose as customer services, technical support, new employees and authority figures to gain remote access to devices, passwords or other information.

Once they have access to your personal or business accounts, they can commence with ransomware spreading.

5. Drive-by downloads   

Finally, drive-by downloads are a threat to consumers and businesses. This is when cybercriminals install malware without the users’ knowledge.

This often happens when people unknowingly visit a malicious website using an outdated browser. Malware is then automatically downloaded onto their computer.

How to avoid ransomware scams

1. Invest in cybersecurity 

To get started, download an antivirus programme that will offer effective protection against malware, such as Bitdefender, Norton and Intego. Then, run an antivirus scan to ensure your device isn’t infected with any malicious software.

2. Back up your files  

Antivirus software may offer real-time protection against cyberattacks, but it will not restore any lost files. So it’s always a good idea to back up your files in advance.

3. Update operating systems and software  

Make sure you’re regularly updating your operating systems and software. This ensures your computer runs smooths and reduces the risk of security breaches.

4. Prevent scams by being vigilant  

Last and certainly not least, you can avoid ransomware attacks by being vigilant. Don’t reply to suspicious emails, avoid downloading unknown files, double check links before clicking on them and regularly change your passwords.

A spokesperson from VPN Overview says: “Ransomware poses a real threat for businesses and consumers alike. Cyber criminals are relentless – they will impersonate others and hold your personal information at ransom. By understanding these ransomware scams, you can stay vigilant and protect your devices from malware.”

Check Also

Tower

CISA, FBI Warns
Hacker compromised multiple teleco network at US

US authorities have revealed a major cyberespionage campaign by hackers, targeting information from Americans in …

Leave a Reply

Your email address will not be published. Required fields are marked *