BotNet News

Your source for Online Security News


Ransomware attacks can be devastating, but there are steps you can take to limit their impact and speed the recovery process.

First, employ a data backup and recovery plan for all critical information. Second, isolate the infected devices and prevent them from infecting other connected devices on your network.

Whether the attack is simple or complex, ransomware encrypts files and demands a ransom in exchange for a key to unlock them. This usually includes passwords, banking details and other sensitive information.

Trends in Ransomware (2019-2020)

A new type of malware is being used by attackers to extort data from large companies. It uses what is known as double extortion to not only encrypt data but also exfiltrate it back to the attackers, threatening to make this data publicly available if a second payment is not made.

It’s an interesting and dangerous new threat. It has the potential to threaten businesses whose revenue depends on their systems being online, and it can also be a threat for smart cities.

Another important aspect of ransomware is that it has become increasingly sophisticated. It can now run on a variety of devices, and it can spread easily through email, through websites, or even by way of embedded code inside image files.

A few examples of this new kind of ransomware are Wysiwye, Cerber and BadRabbit. These are all capable of stealing Remote Desktop Protocol credentials and spreading across networks. These attacks can be very effective if they’re well-timed, and they can also be profitable for the hackers.