A worldwide cyber-attack has been happening since Friday, affecting more than 200,000+ organizations in 150+ countries.
The WANNACRY RANSOMWARE ATTACK has rapidly become the nastiest digital disaster to strike the internet, crippling transportation and hospitals globally. But, it progressively appears that it is not the work of hacker brains.
Instead, cyber-security detectives see the recent breakdown of cyber-criminal scheme, which reveals amateur mistakes made at every steps.
Ransomware is a kind of cyber-attack, in which, hackers take control of a computer system and block access to it until a ransom is paid.
The cyber criminals need to download a type of malicious software onto a system within the network to gain access to the system. This is often done by making the victim click on a link or download it by mistake.
Once the software gets into the victim’s computer, the hackers can launch an attack that will lock all the files it finds within the network. It tends to be a gradual process with files being encrypted one after the other.
Though the infection stage is somewhat different for each Ransomware version, the key stages are as follows:
One should take the threat of Ransomware seriously and do something about it before it smashes the data.
Here are few precautions
Step 1: Do not store important data only on your PC. Take 2 backups of data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.
Step 2: The Dropbox/Google Drive/OneDrive/ applications should not be turned on by default.
Step 3: Turn off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.
In the browser:
The answer is a big NO.
Paying the ransom does not give guarantee that the online criminals at the other end of the Bitcoin transfer will give the decryption key. And even if they do, there will be further greedy attacks, which will become a never-ending malicious cycle of cyber-crime.
Putting things into perspective, 1 out of every 4 cyber-crime victim who paid the ransom didn’t get their data back. They lost both the information and their money.
There are many versions and types of Ransomware, but cyber security researchers are working round the clock to break the encryption that at least some of them use. There are many other cryptoware strains that are well coded and only specialists are able to crack.
Not sure if your system in secure? Don’t Worry!!
Our Security Testing experts will guide You
To recover the data without funding Ransomware creators, we have put together a significant list of Ransomware decryption tools which can be used.
Globe3 decryption tool
.8lock8 ransomware decrypting tool
7ev3n decrypting tool
Alma decrypting tool
Bart decrypting tool
CrySIS decrypting tool
Democry decrypting tool
DMA Locker decrypting tool + DMA2 Locker decoding tool
Fury decrypting tool
GhostCrypt decrypting tool
Globe / Purge
Lamer decrypting tool
Lock Screen ransomware
Mircop decrypting tool + alternative
Merry Christmas / MRCR decryptor
Operation Global III Ransomware
Ozozalocker ranomware decryptor
PowerWare / PoshCoder
Shade / Troldesh
Please read about how these tools work before using it as a solution.
Do keep in mind that decryptors could become outdated due to constant updates and new versions released by cyber criminals. This is a never-ending battle, which is why we should focus on prevention and having multiple backups for your data.
By Uma Raj
By Uma Raj
By Abishek Balakumar