BR +55 11 3069 3925 | USA +1 469 620 7643

Ransomwares are everywhere: know this trend

by | Oct 18, 2021 | BLOG

When it involves ransomware protection, it is better to be safer than sorry, isn’t it? To achieve this goal, a vigilant outlook and the right security software are essential, since a moment of carelessness is enough to fall victim to a cyberattack.

You probably know what ransomware is, but it is worth remembering: it is a type of extortion malware that can lock down your computer and then demand a ransom to return the operating systems. In May 2017, for example, the WannaCry variant spread around the world and reached more than 100 million users, claiming some major victims, such as the UK’s National Health Service (NHS). It infected more than 230,000 computers in 150 countries in just one day.

Since then, ransomware has spread around the world, with new types and new hits, and with that, cybersecurity solution makers have increasingly focused their actions on preventing attacks by this “pirate” of nowadays. And to support the fight against this increasingly frequent cybercrime, we launched the #stopransomwareattacks campaign on our social networks, with the aim of raising awareness among IT professionals and society about the variety of ways this malware appears on operating systems and the risks caused by a simple click.

What are the kinds of attacks?

The forms of attacks are diverse: ranging from messages about unlicensed applications to false claims about inappropriate content, in some cases resulting in the payment of fines or the need to restore devices to factory settings.

From the most aggressive to the most imperceptible forms, some of the main ransomware variants are:

Petya: It goes beyond hacking into files and can bring the entire system to a halt, causing devastating results.

zCrypt: It does not attack files directly; it acts like a classic virus, acting on recently handled files to boost the impact.

Jigsaw: This attack begins with a simple greeting message, followed by a ransom demand, threatening the victim with the removal of all their data within 72 hours.

Wannacry: The infection by this ransomware was indeed a global epidemic, scaring everyone and causing companies and government agencies to rush to seek protection solutions. The losses caused by this malicious software are estimated to have totaled $4 billion worldwide.

Ransomware, in all its forms and variants, represents a significant threat to both independent users and enterprises. That’s why it’s even more important to be aware of the threats it portrays and be extra careful in eventualities. 

Join the #stopransomwareattacks campaign! Post pictures on your social media networks with signs written with the hashtag, tag senhasegura’s profile and share with friends… Let’s stop the dynamics of malicious activity!

If you want to know more about how ransomware acts on a system, senhasegura will promote the webinar “Dissecting Ransomware Attack – Protecting your Company Accesses” on the October 26th at 3pm (CET), with a live demonstration by Cybersecurity Researcher, Filipi Pires, and by senhasegura’s System Analyst, Gabriel Oba, who will clarify all doubts with a highly conscious approach to the use of devices and what is the adequate product to mitigate the risks of this type of malicious attack. 

We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.

Top 7 Types of Phishing Attacks and How to Prevent Them

Social engineering, in the context of information security, consists of practices performed by hackers to manipulate users to take actions that go against their interests, exploiting their vulnerability and lack of knowledge for their benefit. One of the main types of...

ISO 27001 – What is the importance of having achieved the certification

The process of digital transformation has intensified in companies of all sizes and industries, and is considered an essential factor for business success. One of the main consequences of this process is the exponential growth in the amount of data from customers,...

Principle of Least Privilege: Understand the Importance of this Concept

Granting administrator access to a user who does not even have time to explain why they need this permission is not an efficient way to solve a company's problems but rather to harm its security.  This is because sensitive data can fall into the wrong hands through a...

How to Prevent DDoS Attacks in Your Company?

There are several methods by which malicious agents attack websites and destabilize network services and resources. One of the most widely used techniques is the DDoS attack, which means distributed denial-of-service. Through this attack, a website ends up becoming...

Gartner and PAM: What Does One of the Most Important Consulting Companies in the World Say About this Cybersecurity Solution?

All of us have already heard of digital transformation at some point. This phenomenon affects companies of all verticals and sizes and has been gaining prominence in the market.  Digital transformation increasingly requires organizational leaders to adapt their...