7 Ways Ransomware Could Invade Your Company
Ransomware is a type of malicious software that is designed to block access to data on a computer, or sometimes even the computer system itself until the owner pays a ransom for its release.
Ransomware can arrive on a computer system the same way any other malware does. The difference with malware and ransomware is that usually those who install ransomware to hold the data hostage are usually not able to breach the data themselves.
Here are 7 ways ransomware could potentially invade your company:
- Traffic distribution services redirect Web traffic to a site hosting an exploit kit. If the host is vulnerable to the exploit kit on the landing page, then the malware is downloaded onto the system as a drive-by download, sometimes without the user’s knowledge.
- Malicious advertisement can redirect users from a harmless site to a malicious landing page. Malvertisements appear legitimate and can even appear on trusted sites if the administrator is fooled into accepting the ad provide or if the site is compromised. Redirected victims can be purchased according to geographical location, time of day, visited site and a number of other factors.
- Phishing emails are the primary method of ransomware, simply because people have been conditioned to open emails and click on links and attachments. According to Symantec, ransomware emails tend to appear as mail delivery notifications, energy bills, resumes, notifications from law enforcement or tax returns
- Downloaders – Malware can be delivered onto systems through stages of downloaders to minimize the detection of signature-based detection. Ransomware criminals pay other malware threat actors to install their ransomware onto already infected machines. Sometimes the ransomware could even act as a mask for a deeper malware infection unsuspected by users that will remain even after the ransomware is removed.
- Social engineering and human ignorance can conspire to get people to install the malware on their own computers. Fake antivirus applications tell users that their computer is at risk of numerous debilitating viruses, and performance optimizers convince users that their system can achieve better results. These types of ransomware require users to initiate the installation
- Self-propagation is a form of crypto-ransomware which encrypts a user’s data. Some forms of ransomware are able to self-replicate through a network and spread itself through a user’s contact book.
- Ransomware as a service – This is the outsourcing of malware to less-technical criminals. The applications are designed to be deployed by almost anyone, with the original creator of the malware collecting a percentage f the ransom as a fee.
For additional info on ransomware, see ICIT Ransomware Report: 2016 Will Be the Year Ransomware Holds America Hostage
Original article source: 7 ways ransomware could invade your company