How ransomware works
There is no easier way to send malware than through an email. Ransomware can be compressed in less than 1MB, which is a file size that most email services will allow for attachments. One of the hacker’s skills is masking the email “from” address as someone you probably know or trust, such as a bank, a friend or a family member.
Once the attachment is opened and executed, it will usually show a web page with all sorts of offers, such as a vacation package or a discount coupon or the next big sale online. But this is only a decoy to capture your attention while the real ransomware is discretely scanning your system and encrypting your files.
When the malware finishes, a prompt will flash on your screen letting you know that your system has been infected and that the only way to get your files back is to enter the decryption key. The prompt also shows time lapsing every second, in a further attempt to raise your anxiety. Ignoring the deadline will either make the ransom double or delete your files entirely.
How destructive is ransomware?
Reports estimated that ransomware cybercriminals have made almost half a billion dollars ($500 million) of combined cash and digital assets in 2018 alone.
The report also claims that 60% of all the victims are small and medium-sized businesses. They’re the low-hanging fruit for cybercriminals, simply because these businesses have less secured, more vulnerable and easily-exploited IT infrastructure, with low awareness of malware threats amongst the employees.
Thanks to the lawsuit and hefty penalty that the victim has to settle in accordance with data security protection laws, many of these victims were unable to get back on their feet and unfortunately shut the business down forever.
If you think you are too small to be of interest to cybercriminals, you might want to think again.
Got ransomware? Custom Technologies can help.
There is no guarantee that the cybercriminal will provide a decryption key after you pay the ransom. This is why we always suggest to just shut down the computer and call us right away.
All computers that are connected via shared folders can be easily infected as well, and your whole business might become compromised. We’ve handled cases where hackers were able to gain access very easily even with security in places such as VPN, IP blocking and more. The threat is real and should not be underestimated.
We offer fast and efficient computer virus (ransomware) and malware (Cryptolocker) removal for businesses of all sizes. We don’t just a scan and go, we use multiple scans to remove all viruses, malware, adware and to eliminate all threats from your system or network.