4 Types of Ransomware That Can Hijack Your Devices
Since appearing on the scene in 2013, CryptoLocker has become one of the most prevalent varieties of malware. This was the first type of malicious software to encrypt victims’ data with randomly generated symmetric keys. Once this task has been accomplished, the symmetric keys are encrypted with public asymmetric keys, and upon full encryption, victims are greeted with a message demanding monetary compensation in return for access to the private asymmetric key, without which the symmetric keys for the encrypted files cannot be decrypted. The message also warns the victim that if the ransom is not paid by a specific deadline, the symmetric key will be destroyed, thereby making it impossible to recover the hijacked data. Website owners interested in keeping CryptoLocker off their sites would be wise in consider top-shelf security solutions. A handy SiteLock review can teach you all about cloud-based options.
Jigsaw doesn’t give victims much time to reflect on their situation before proceeding to cause substantial damage. Once this evil little piece of a malware finds its way onto a victim’s device, it will inform them that unless a ransom is paid, every file on the device will be deleted. It then proceeds to start deleting files at a steady pace until the aforementioned financial demands are met. As more time passes, more files are deleted per hour. If the 72-hour mark is reached without a ransom being paid, every remaining file on the device will be deleted en masse.
Deriving its name from the French word for “encryption,” LeChiffre commonly infects unsecured desktop computers. Unlike self-operational varieties of malware, LeChiffre must be run manually by cybercriminals. When seeking out targets, crooks scan networks in search of desktops whose security isn’t up to snuff. Upon selecting a target, perpetrators will log into the computer remotely and proceed to install LeChiffre. As is the case with most other forms of ransomware, the endgame involves demanding a ransom in return for the device’s safety. Of course, complying with these demands doesn’t necessarily mean that all traces of LeChiffre will be removed. Furthermore, regardless of whether or not a ransom is paid, the perpetrators are still likely to make off with sensitive personal data.
Malware is a favorite tool of cybercriminals and is commonly used in conjunction with a variety of online scams. While certain types of malware are relatively benign, ransomware is not among them. In addition to being one of the hardest types of malware to get rid of, it’s capable of causing substantial damage in a very short period of time. The consequences of a ransomware infection range from unusable devices to complete financial ruin. Steering clear of ransomware in all its forms can go a long way in ensuring your online safety.