The ransomware has a great influence on the whole world.
The following is the knowledge about computer security ransomware collected by Chongqing Computer Training/Collection. I hope it helps you.
1. How does malicious ransomware work? As the name implies, it's like kidnapping a hostage for ransom.
Once your computer is infected, you will find two things: First, your files will be encrypted or converted into other languages that only hackers can decrypt.
Second, you often open the file before you know that you have become the target of an attack.
According to the destructive version of 12, this malware can lock your whole system.
In the attack that broke out in Britain, the computer screen showed that the attacker had to pay $300 worth of bitcoin in exchange for the decryption key to unlock the file.
The attacker had three days to consider whether to pay the ransom, and after three days, the ransom amount doubled.
This attack mode is similar to the attack on Los Angeles Hospital 1 month ago, when the hospital was forced to pay a ransom of 1.7 million dollars, and hackers even set up a help hotline to answer questions about paying the ransom.
This attack relies on the so-called WannaDecryptor, also known as WannaCry or WCRY.
These attacks are particularly difficult to detect, mainly because hackers are always adjusting them.
WannaDecryptor has only been used for a few weeks and has just undergone an upgrade.
Blackmail attacks on the NHS look a lot like WannaCry.
The same malware also attacked Telefonica and other large organizations in Spain.
2. How did the computer get infected? There are many ways.
If you download infected software or PDF files, hackers can implant ransomware into your system.
They can also use phishing emails or send infected websites directly to you.
In this case, the hacker sends a compressed file attachment in an email.
When the victims click, their computers will be infected.
But the attack can't stop, and the ransomware will spread through the computer network of hospitals or companies.
CliffordNeuman, director of the Center for Computer System Security affiliated to the University of Southern California, said: "When malware takes a firm foothold in your system, other users will start running it.
"