BR +55 11 3069 3925 | USA +1 469 620 7643

Ransomwares are everywhere: get to know this trend (and #stopransomwareattacks!)

by | Oct 18, 2021 | BLOG

When it involves ransomware protection, it is better to be safer than sorry, isn’t it? To achieve this goal, a vigilant outlook and the right security software are essential, since a moment of carelessness is enough to fall victim to a cyberattack.

You probably know what ransomware is, but it is worth remembering: it is a type of extortion malware that can lock down your computer and then demand a ransom to return the operating systems. In May 2017, for example, the WannaCry variant spread around the world and reached more than 100 million users, claiming some major victims, such as the UK’s National Health Service (NHS). It infected more than 230,000 computers in 150 countries in just one day.

Since then, ransomware has spread around the world, with new types and new hits, and with that, cybersecurity solution makers have increasingly focused their actions on preventing attacks by this “pirate” of nowadays. And to support the fight against this increasingly frequent cybercrime, we launched the #stopransomwareattacks campaign on our social networks, with the aim of raising awareness among IT professionals and society about the variety of ways this malware appears on operating systems and the risks caused by a simple click.

What are the kinds of attacks?

The forms of attacks are diverse: ranging from messages about unlicensed applications to false claims about inappropriate content, in some cases resulting in the payment of fines or the need to restore devices to factory settings.

From the most aggressive to the most imperceptible forms, some of the main ransomware variants are:

Petya: It goes beyond hacking into files and can bring the entire system to a halt, causing devastating results.

zCrypt: It does not attack files directly; it acts like a classic virus, acting on recently handled files to boost the impact.

Jigsaw: This attack begins with a simple greeting message, followed by a ransom demand, threatening the victim with the removal of all their data within 72 hours.

Wannacry: The infection by this ransomware was indeed a global epidemic, scaring everyone and causing companies and government agencies to rush to seek protection solutions. The losses caused by this malicious software are estimated to have totaled $4 billion worldwide.

Ransomware, in all its forms and variants, represents a significant threat to both independent users and enterprises. That’s why it’s even more important to be aware of the threats it portrays and be extra careful in eventualities. 

Join the #stopransomwareattacks campaign! Post pictures on your social media networks with signs written with the hashtag, tag senhasegura’s profile and share with friends… Let’s stop the dynamics of malicious activity!

If you want to know more about how ransomware acts on a system, senhasegura will promote the webinar “Dissecting Ransomware Attack – Protecting your Company Accesses” on the October 26th at 3pm (CET), with a live demonstration by Cybersecurity Researcher, Filipi Pires, and by senhasegura’s System Analyst, Gabriel Oba, who will clarify all doubts with a highly conscious approach to the use of devices and what is the adequate product to mitigate the risks of this type of malicious attack.

 

LEARN MORE 

 

Are you enjoying this post? Join our Newsletter!

3 + 2 =

We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.

An Overview of Saudi Arabia’s Personal Data Protection Act (PDPL)

Saudi Arabia’s Personal Data Protection Law (PDPL) was implemented by Royal Decree M/19 of 9/2/1443H (September 16, 2021), which approved Resolution No. 98 of 7/2/1443 H (September 14, 2021). It was published in the Republic Journal on September 24, 2021. The Saudi...

The 5 Biggest Data Leaks of 2021

During the pandemic, cyberattacks grew more than ever. Theft, hijacks, and data leaks are increasingly popular practices in cybercrime. The lock and hijack for ransom (ransomware) category has stood out a lot, as data is a highly valuable resource and most companies...

HIPAA: Five Tips for Complying with The Certificate

What is HIPAA? Currently, this is one of the most frequently asked questions by many professionals working in the healthcare industry, especially in times of the Covid-19 pandemic. But why is it so important and what are its benefits for healthcare companies? First,...

How Does The LGPD Impact Companies?

Due to the growing technological development in the market, we can clearly see how much how consumers tend to buy products and services has changed. Through more practical technologies, such as cellphones, laptops, and tablets, for example, they are just a click away...

What Is the Difference Between IAM and PAM?

It is important to know the differences between IAM (Identity & Access Management) and PAM (Privileged Access Management). However, this theme still raises doubts for some people. First, it is necessary to understand that the need to obtain an identity is...
Copy link
Powered by Social Snap