The world has been embroiled in a different kind of battle for decades now. There is no exchange of shots here, and there is no bloodshed either. But what people, private entities and government organizations lose if they slip is no less than their blood. It is their hard-earned money and the reputation that is at stake.


It is the virtual world and most of the inhabitants here are up against scary malwares. And for the creators of these bugs, ransomware is most lucrative.





According to research from Unit 42 by Palo Alto Networks, the global cybersecurity leader, ransomware payments hit new records in 2021.


India saw a 218% rise in ransomware attacks in 2021. The 2022 Unit 42 Ransomware Threat Report has revealed that India ranks 10th globally when it comes to the number of ransomware attacks. More worrisome is the fact that it ranks second in the Japan and Asia-Pacific (geographic region).


But what happens when your system falls prey to ransomware. It is scary. The hacker holds your files and data, including sensitive information, hostage until you pay up.


Basically, ransomware, better known as ransomware, is a type of malware that prevents you from accessing your personal files or system. In simple terms, your critical data gets encrypted so that you cannot access files, applications, and databases. As McAfee explains, ransomware involves the use of asymmetric encryption. A pair of keys is used to encrypt and decrypt the files or data targeted. Then it demands that you pay a ransom in order to regain access.


Once it enters your system, the ransomware searches and encrypts valuable files. Everything from Microsoft Word documents, databases and images are compromised. The ransomware can also take advantage of network vulnerabilities to spread to other systems. It can even spread across entire organisations.


The attacker generates a unique public-private pair of keys for the victim. The private key needed to decrypt the files is stored on the attacker’s server. After the ransom is paid, the attacker provides the private key to the victim.


It is almost impossible to decrypt the files or data that are being held hostage without access to the private key.


After the files have been encrypted, the ransomware demands that the victim pay up a ransom within 24 to 48 hours to decrypt them. If they don’t, the targeted files will be lost forever.


How does ransomware enter your system in the first place?According to kaspersky, the most common infection routes for ransomware are visiting malicious websites, unwanted add-ons during downloads, and downloading malicious attachments.


Watch video

Dear Reader,

Business Standard has always strived hard to provide up-to-date information and commentary on developments that are of interest to you and have wider political and economic implications for the country and the world. Your encouragement and constant feedback on how to improve our offering have only made our resolve and commitment to these ideals stronger. Even during these difficult times arising out of Covid-19, we continue to remain committed to keeping you informed and updated with credible news, authoritative views and incisive commentary on topical issues of relevance.

We, however, have a request.

As we battle the economic impact of the pandemic, we need your support even more, so that we can continue to offer you more quality content. Our subscription model has seen an encouraging response from many of you, who have subscribed to our online content. More subscription to our online content can only help us achieve the goals of offering you even better and more relevant content. We believe in free, fair and credible journalism. Your support through more subscriptions can help us practise the journalism to which we are committed.

Support quality journalism and subscribe to Business Standard.

Digital Editor





Source link

Leave a Reply

Your email address will not be published.