How to Handle Malware and Ransomware Attacks
Malware is any kind of software threat that interferes with your computer, tablet or mobile device. It may steal data, encrypt your files, spy on your activity without your knowledge, and even cripple the systems that control your devices. Its motives are often financial: to steal your banking credentials, sell access to computing resources or extort you by blocking your ability to use your computer until you pay a ransom.
The most common way that malware gets into devices is through human intervention: either a lack of adequate security measures, risky behavior or both. Cybercriminals hide malicious code in files that are downloaded from websites or sent via instant messaging, email or P2P file-sharing programs. Having an incident response plan that includes how to handle different types of malware attacks will help minimize the damage they can cause.
Many kinds of malware attack a system with the help of exploits, bits of code that take advantage of vulnerabilities in your hardware, operating system or software program. Some examples include adware, viruses, worms, Trojan horses, spyware, ransomware and botnets.
For malware to do its damage, it must get onto your device. Perpetrators do this by enticing you to click on a link or open an attachment or visit a website that is infected with malware. Some examples include IM worms like NgrBot that spread by sending malicious download links to the infected users’ contact lists, or ransomware such as the infamous ILOVEYOU that encrypts a user’s files and displays a popup demanding a payment to decrypt them.