Ransomware may appear in many different forms. Its purpose is to prevent users from gaining access to system files or personal files until a ransom is paid. Usually, once the ransom is paid, access is regained. It is common that ransom payment is demanded via credit card or cryptocurrency.
There are numerous ways that ransomware can infect your computer. The most common way is through malicious spam which are unsolicited emails used to deliver malware. The emails will contain attachments such as word documents and PDFs that have malicious links.
Malicious spam also referred to as malspam makes use of social engineering to deceive people into clicking on malicious links that appear to be legitimate and into opening attachments. Another aspect of malicious spam is by posing as government agencies such as law enforcement to scare victims into paying the ransom.
Malicious advertising or malvertising has been used to distribute malware with little to no user interaction. Users will be directed to criminal servers even when on they are on legitimate websites simply by clicking on a malicious ad(s). The servers will catalog details of the victim’s computer and their location to deduce which is the best malware to deliver. Malvertising will make use of an infected iframe and exploit kit where a malicious download will be downloaded to attack a system without the user’s knowledge.
Other types of ransomware differ in severity and the risks involved and may include:
Mobile ransomware targeted at mobile devices has been on the rise. Typically, the ransomware will display a message that the device is locked due to alleged illegal activity. The mobile ransomware is delivered via malicious apps.
The best protection against ransomware is by preventing it from happening. Even though methods exist to deal with ransomware infections, they are imperfect at best; owing to the evolving nature of ransomware and the need for technical expertise.
You can prevent ransomware attacks through the following actions: