Ransom Ware
This cyber attack blocks all access to files on an individual's device or network until a victim pays a ransom.
This cyber attack blocks all access to files on an individual's device or network until a victim pays a ransom.
A hacker uses a sophisticated piece of malware to remotely disable the targeted device
completely blocking access
to the victim's files, or in the case of
a corporate attack, disabling an
organization's network.
Only by paying a demanded ransom can victims regain access—and even then there is no guarantee cyber criminals will be true to their word and return what was stolen.
Ransomware is such a prevalent attack that you’re sure to hear about it, and probably on a large scale.
Here are some ransomware tactics to look out for:
Fake Apps are fraudulent applications for mobile devices that look legitimate, either by mimicking actual apps from reputable companies or by offering fake services, like virus scanning.
When a user downloads a fake app, it infects the targeted device with ransomware.
Lockers infect personal computers, scouring targeted devices in search of file extensions to encrypt.
Once the files are encrypted, the locker virus opens
a window containing details about the infection and
the terms of the ransom demanded in exchange
for the decryption key.
Hackers seized control of the Hollywood Presbyterian Medical Center's computer systems, paralyzing the hospital's communications for about 10 days.
To get operations back on track, Hollywood Presbyterian paid the hackers with Bitcoin—an alternative digital currency not based on a centralized banking system.
The ransom was equivalent to $17,000 and was paid before authorities were contacted.
Hospital president Allen Stefanek believed it was "the quickest and most efficient way" to free the hospital's network.
The Hollywood Presbyterian
Hospital situation highlights why ransomware is so dangerous. Most of the time, there is no other solution than to pay the ransom, especially in cases where
critical services depend on the hijacked information.
Use what you’ve learned about ransomware to select the best answer to the following questions.