Cybercrime rings: Gameover Zeus
Written by a NortonLifeLock employee
The fight against malware is more than a little like an arms race. Just as the good guys come up with “foolproof” ways to beat the bad guys, the bad guys come up with new ways to achieve the same ends. In fact, a lot of what the good guys are doing is playing whack-a-mole with the bad guys. The bad guys are, for the most part, the innovators. The good guys are doing all they can to stop emerging threats. Case in point: ransomware, an aggressive form of malware. Symantec was able to work with the FBI and UK’s National Crime Agency to shut down the Cryptolocker ransomware gang, but don’t think that means there won’t be ransomware threats of a similar nature in the future.
Help protect your digital life on your devices.
Are you afraid of losing your personal information or all the precious things on your computer? Get comprehensive protection with Norton Security Deluxe across all your devices – up to 3 PCs, Macs, smartphones or tablets.
Create an account today and try it free for 30 days on up to 3 of your devices.
What Is Ransomware?
Ransomware is a kind of malware designed to hold your files hostage using encryption and demanding a "ransom" in order to get your files back. In the case of Cryptolocker, the malware would encrypt files on your entire hard drive, then demand payment to decrypt it. In all, it’s estimated that 3 percent of all infected victims paid the ransom, which means that the criminals overseeing the enterprise earned tens of millions off of this form of malware alone.
What is the worst that can happen?
As Talman Software recently found out, all it takes is just one ransomware attack to bring business to a standstill. Over 75% of the wool industry in New Zealand and Australia uses the trading and buying software – exporting up to $80 million a week 1. All their files had become encrypted and their databases had become locked by the ransomware attack, rendering their software inoperable.
Rather than use a malware removal tool however, Talman rejected the ransom of $8 million and instead decided to painstakingly re-build their software 2. Even though sales came to a standstill for several days, wool prices are still expected to drop due to the fallout.
Apart from businesses, Australian councils are also a target for ransomware attacks. The City of Onkaparinga council in Adelaide was cyber-attacked in January this year by the infamous Ryuk ransomware, which shut down most of their systems 3. This is the same ransomware that struck New Orleans December last year.
With already 135 ransomware and malware attacks reported in 2020 so far 4, below is some important information about ransomware and how you can protect yourself with Norton.
How Does Ransomware Infect Your Machine?
One of the most common form of transmission for ransomware is phishing emails. You get an email that uses social engineering in an attempt to get you to open a file. Many times this might be the promise of a prize or some kind of information about yourself.
Once you open the file, however, the ransomware Trojan is loaded onto your computer. Once that happens, the file installs a program that phones home and begins encrypting all of your files. If you ever want to see them again, you have to pay the piper.
How to Protect Yourself Against Ransomware
There are a few simple ways to protect yourself against ransomware and avoid becoming a victim:
- Install a full-service Internet security software suite that protects all the traffic on your home network.
- Keep that software and all your other applications updated. Malware uses known flaws in older versions of data to do their dirty work.
- Don’t download files from strangers or click on suspicious-looking links.
- Perform regular backups to protect your data. In the event that you do become compromised, you’ll have something to fall back on without paying the criminal.
What to do if you suspect your computer has ransomware?
- Do not pay the ransom. When you pay the fee, there’s no guarantee that they will even decrypt your information. Nothing is stopping them from taking the money and walking away from the entire situation.
- Restore any impacted files from a known good backup. Restoration of your files from a backup is the fastest way to regain access to your data.
- If you do not have any backups of your computer, you can try Norton’s Power Eraser tool for free. To learn more about the tool, you can read the tutorial.
Isn’t it time to upgrade your security?
Upgrading to new devices and software can often mean downgrading your privacy and security. It’s time to take your security seriously. Download the full version of Norton Security Deluxe free for 30 days, and test-drive it on up to 3 of your devices – PCs, Macs, smartphones or tablets.
Create an account today and be up and running in minutes.
1 “Cyber attack forces cancellation of wool sales across Australia” abc.net.au, February 2020.
2 “Ransomware attack on sheep farmers shows there's no room for woolly thinking in cyber security” techxplore.com, March 2020.
3 “Suspected Ryuk ransomware attack locks down Adelaide's City of Onkaparinga council” abc.net.au, January 2020.
4 “Scam statistics” scamwatch.gov.au, March 2020.
Copyright © 2020 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the United States and other countries. Firefox is a trademark of Mozilla Foundation. Android, Google Chrome, Google Play and the Google Play logo are trademarks of Google, LLC. Mac, iPhone, iPad, Apple and the Apple logo are trademarks of Apple Inc., registered in the U.S. and other countries. App Store is a service mark of Apple Inc. Alexa and all related logos are trademarks of Amazon.com, Inc. or its affiliates. Microsoft and the Window logo are trademarks of Microsoft Corporation in the U.S. and other countries. The Android robot is reproduced or modified from work created and shared by Google and used according to terms described in the Creative Commons 3.0 Attribution License. Other names may be trademarks of their respective owners.