RAFAEL ELADIO NUNEZ APONTE EXPLAINS WHICH SYSTEMS ARE MOST AFFECTED BY RANSOMWARE

It is considered the "red alert" for systems. Encrypting ransomware hijacks computer files and figures, demanding payment to decrypt them again and return them to you. The reason this type is so dangerous is because once the cybercriminals get hold of the files, there is no security software or system restore capable of getting them back to you. Unless you pay the ransom, you can kiss your files goodbye, even if you pay it, there is no guarantee that the cyber criminals will return your files to you.

According to the businessman and ethical hacker Rafael Eladio Núñez Aponte, computer systems have become over time a target for cyber attacks, which over time can affect both the person using these means and companies, since it affects their performance and protection of information in their databases.

Under this scenario, one of the multiple ways of violating computer systems is through the so-called "ransomware". These are defined as a type of malware that works as an impediment for users to access their system or personal files and, in turn, demands the payment of a ransom to be able to access them again.

Since the creation of this virus there have been several variants. The first of these was created in the late 1980s, and the payment received by the individual to affect other people's systems was via postal mail. Another common infection method, which reached its peak in 2016 is malvertising. Malvertising is the use of online advertising to distribute malware with little or no user interaction.

While browsing the web, even legitimate sites, users can be taken to criminal servers without clicking on an ad. These servers sort through the details of victims' computers and their locations and then select the most appropriate malware to deliver. Frequently, that malware is ransomware.

Ransomware used to breach systems

Rafael Eladio Núñez Aponte explains that, nowadays, ransomware creators ask for payment to be made via cryptocurrencies or credit cards, taking a completely different leap from the traditional method of payment and action. In this regard, there are various ransomware that can be used to breach systems, including the following:

Scareware

This includes fake security programs and fake offers of technical support. The person may receive a pop-up message informing them that malware has been detected and that the only way to get rid of it is to pay. By not making this payment you may continue to be bombarded with pop-up messages, but your files are basically safe.

Screen blockers

This type can be considered an "orange alert" for systems. If a screen-locking ransomware reaches your computer, it will prevent you from using your PC altogether. How is it triggered? When you turn on your computer, a full-screen window appears, often accompanied by an official-looking FBI or U.S. Department of Justice emblem, telling you that illegal activity has been detected on your computer and that you must pay a fine. It is important to note, that the FBI does not operate in this manner but rather goes through regular channels to deal with any type of alert that may be reported to them.

Encrypting Ransomware

It is considered the "red alert" for systems. Encrypting ransomware hijacks computer files and figures, demanding payment to decrypt them again and return them to you. The reason this type is so dangerous is because once the cybercriminals get hold of the files, there is no security software or system restore capable of getting them back to you. Unless you pay the ransom, you can kiss your files goodbye, even if you pay it, there is no guarantee that the cyber criminals will return your files to you.

Usually these viruses are detected in different ways, one of them is if the affected person realizes that he/she has been infected with ransomware and does not want to pay "ransom" one of the advice the FBI always gives to affected people is not to fall for the hacker's games.

For if the person gives in all they would achieve would be to encourage cyber criminals to launch additional attacks against you or others. However, it is possible to recover some encrypted files using free decryptors.

Another way to deal with the infection problem is to download a security product that assists in disinfection and in turn runs a scan to remove the threat. This may not recover all the files, but you can be sure that the infection has been fixed.

Most targeted systems

Now, Rafael Eladio Núñez Aponte indicates that, despite the fact that currently there are several mechanisms to deal with these problems, there are still systems that can be affected faster than others. It is for this reason that we want to share with you some of these systems and how they have responded to these attacks.

Windows

It is considered one of the most attacked systems in the last decade by this type of virus. According to studies, 61% of attack campaigns are directed at Windows users, as this usually has a strong influence on the fact that it is the most used desktop operating system in the world.

Therefore and as it is known, most malicious campaigns target Windows users. This has come to light thanks to statistics shared by the cybersecurity company Devcon. Also, it has been shown based on the data collected by the firm, that 61% of malicious ads collected between July 11 and November 22, 2019, were targeting Windows users.

This includes malicious campaigns designed to redirect the user to malicious sites. At the same time these are done to trick the user into downloading malware that infects their computer. Hence, for example, Windows Defender antivirus is growing steadily.

ChromeOS

Due to its small market share, it is normal that ChromeOS does not appear on the list. However, what is striking is that Google specified that its operating system did not suffer any ransomware attack in the last year and a half for any enterprise, school or general consumer customers.

As we mentioned, that doesn't mean that ChromeOS is invulnerable, or that Windows is easy to attack. But the logic followed by cybercriminals in recent years indicates that ChromeOS is under-attacked because it has not gained the popularity of other operating systems. Also, Google's report only contemplates ransomware, when the most popular cyberattacks are phishing or zero-day exploits.

Mobile devices

We all live connected to mobile devices and hackers know it, that's why viruses are not only transmitted to PCs or laptops but also to Android mobile devices that can be affected faster. It wasn't until the arrival of the infamous CryptoLocker and other similar families in 2014 that ransomware started to be seen on a large scale on mobile devices.

Typically mobile ransomware pops up a message stating that the device has been locked due to some sort of illegal activity. The message says that the phone will be unlocked once a fee is paid. Often mobile ransomware is introduced through a malicious application and requires you to boot the phone into safe mode and remove the infected application in order to regain access to your mobile device.

Rafael Eladio Núñez Aponte points out that it is important for each user and person to know what these attacks on computer systems are about and how they can occur in order to take the necessary corrective measures and have the necessary protection. Companies such as MásQueSeguridad have a network of experts that can help train and protect people and companies against these attacks. For more information you can visit their website where you will find all their products and services.

 

VEA TAMBIÉN:

https://entornointeligente.com/2022/11/22/el-empresario-rafael-eladio-nunez-aponte-hablo-de-amenazas-a-la-ciberseguridad-en-conversatorio-desafios-tecnologicos-2023-de-britcham/

El empresario Rafael Núñez Aponte Luz Stella Rozo conversaron sobre los Ángeles – Entorno Mundial

Salir de la versión móvil