Tuesday, March 10, 2020

How would you get ransomware?

An incredible method to commence a phishing mindfulness instructional class is to ask, "How would you get ransomware?" most of learners will know that ransomware assaults can be propelled by tapping on a malignant URL or opening a contaminated email connection. Aware of the ongoing WannaCry assault, some might know about the significance of staying up with the latest. Other assault vectors are far less commonplace—drive-by downloads, malvertising and "discovered" USB drives, for instance.


Contingent upon students' reactions to "How would you get ransomware?" you might be agreeably astounded or extremely concerned. At any rate by posing the inquiry (and overlooking the unavoidable shrewd Alec who answers, "You get ransomware from the Dark Web"), you check your workers' vulnerability to online dangers and the fundamental estimates you'll have to take to raise phishing mindfulness.


More info @  how to get ransomware

Wednesday, March 4, 2020

ransomware security

How to protect yourself from ransomware -  ransomware security

1. Do not open suspicious e-mail attachments, visit unknown websites and download applications from official sources. Learn about phishing attacks and do not click on phishing attacks.

2. Back up your files regularly. If you have backups, after cleaning the ransomware on your computer with your antivirus program, you can restore your backup files (your backups can be found in the cloud or on external disks).

3. Use a good anti-virus program. Kaspersky Internet SecurityYou can try, thanks to the special "System Monitor" module in our program, it provides protection especially against ransomware.

Meanwhile, according to independent tests, Kaspersky Internet Security has achieved 100% success against tried ransomware

Friday, February 28, 2020

how to prevent ransomware attack

Malware is the abbreviation of the English combination of "Malware" Malicious Software. Malware is called all of the worms, trojans, and other malicious computer programs that hackers use to access sensitive information on users 'or organizations' systems. Malware, as defined by Microsoft, is a complete definition of software designed to damage a single computer, server, or computer network.

Malware types

There are several different ways to categorize malware; The first is about how malware replicates.

You've probably heard of the terms virus, trojan, and worm.

Worm is part of independent malware that can spread from computer to computer.

A virus is another type of malware that hijacks the code of another independent program.

Although Trojan is a software that does not have the ability to reproduce itself, it shows itself as a useful software for the user and manipulates the user to activate it. So it starts to spread to the whole system.

Another way to categorize malware is related to what it does after successfully infecting the victim's system. There are a variety of potential attack techniques commonly used by malware.

Spyware; Webroot is defined as software designed to secretly collect data about a user by definition of Cybersecurity. It is basically designed to capture data that you send and receive while using your computer and forward it to a third party. For example, a keylogger is a great example of spyware that is used to capture passwords by recording all keystrokes that the user makes with his keyboard.

Rootkit (root user team); It is a set of software tools that provide remote access and control to a computer or a system by definition of TechTarget. The root user team, which successfully reaches the target system, takes over the administrator permission and can use this power successfully.

Adware; A type of malicious software that forces your internet browser to download more malware and redirects it to such web ads.

Ransomware (ransomware); It is malicious software that encrypts your hard drives after infiltrating your system and requests payments like Bicoin in exchange for these passwords. It is mathematically impossible for victims to access files encrypted by this software.

Cryptojacking; Malware that forces hackers to become victims of unnoticed or forced bitcoin mining. This malware uses your entire CPU setup to run Bitcoin mining by running as a javascript in the background of your system.

Malicious advertising (Malvertising); software used to infiltrate victims' computers, without the knowledge of the user of legitimate advertisements or ad networks. For example, a cyber pirate pays to advertise on an ordinary website and advertises on this site. Then, when a user clicks on the ad, the coding in the ad redirects it to a malicious website or installs malicious software on their system. This system can be installed on the computer automatically upon the user's request.

Some malware can be part of many categories. For example, although WannaCry appears as a ransom software, it can be used to perform many different attacks. Similarly, Emotet was found to be used both as a trojan and a worm.

how to prevent ransomware attack ?


Most malware infects systems via email and phishing mail. The best way to prevent this is to strictly protect your emails and ensure that your users are sure how to detect the danger. Also make sure that it is safe before running attachments, even in emails from someone you know to your system.

Apart from that, using your entire system with the necessary precautions in the latest version will keep many malware away from your system. When you want to focus on the files you want to protect, never forget to back up these files frequently, especially in order to be protected from ransomware. So even if your hard drive is encrypted, you can easily fend off this threat.

Malware protection

Antivirus programs are the most widely known product in the category of malware protection products; Although it uses the name "virus", most antiviruses provide security against all types of malicious software. Among the best antivirus software today, Kaspersky Lab, Symantec and Trend Micro trio lead the latest tests by AV-TEST.

How is malware detected?

Malware is always likely to infiltrate your site, even if you take the most important precautions for your system.

Advanced software available today to see what's going on in your system network and to detect malware infections. Most malicious software uses your network as an agent to infect all your systems, by spending a few dollars to protect your network traffic, you can have these software and count the security of your network.

Getting rid of malware

How to remove malware infected by the system is a million dollar question. Malware removal is a very difficult task and methods may vary depending on the threat you face. Some free antivirus software on this topic can be seen by your business. However, if you are facing larger-scale threats, hard work is waiting for you.

Thursday, February 27, 2020

Criminals attacked Croatia's largest oil company

Cybercriminals attacked the largest oil company INA Group in Croatia. During the cyber attack, the attackers allegedly used the CLOP ransomware, which encrypted the data of some of the company's internal servers, ZDNet reported.

This incident did not affect the supply of gasoline to customers and did not affect the performance of the company's payment systems. However, as a result of the attack, the company was unable to issue invoices, record the use of loyalty cards, issue new mobile vouchers and new electronic vignettes, and also accept payment from customers for fuel.

Although the INA Group did not disclose details about what malware was used in the attacks, it is assumed that this is a CLOP ransomware. Several factors testify to the involvement of the ransomware. In particular, a few hours before the INA Group published a statement about the incident, an analyst at Sophos announced the start of activity of the new C&C server used in CLOP cyber attacks. In addition, this week, security researchers discovered new versions of the CLOP ransomware virus on the VirusTotal service.


Recall this week SecurityLab wrote about cyber attacks is, in the US operator of the gas pipeline, which resulted in its computer networks have been infected extortionate software. Attackers used a phishing link to gain initial access to the organization’s information computer networks, and then targeted the OT network (Operational Technology).