May 6, 2015

Posted by in Gadgets, Hardware, Software, Technology | Comments Off on The Latest Digital Threats That Seek To Hijack Your Computer

The Latest Digital Threats That Seek To Hijack Your Computer

If a couple of years ago it was the RansomWare malware seeking to seize control of computers and mobile devices, in recent months there has emerged a new threat: ExtortionWare. If the user falls for the lure of ExtortionWare, the victim won’t be able to view blocked files, on their computer, under a cipher unknown. They will have to pay the offender if they want to unlock it. For the viewing of sexual content, incautious or unwary can be threatened with the denunciation of their intimate contacts to their social networks and videos trying to see activities. But not quite so extreme, in less sordid situations you can fall into the hands of gangs dedicated to kidnapping of computers and further extortion.

This new malware has moved from sex pages to the general ad networks. Thus, it is no longer necessary to be envisioning pornographic content to jump a request for updating the Flash Player (video executing program) actually hiding the activation of a virus. Anyone can fall on any page in the ExtortionWare, as explained in Consumer Eroski, which also states what to do in these cases

How they attack

Cyber criminals have managed to infiltrate ad networks of ordinary ads without any controversy and distributed by most general pages. How do they pass filter ad networks and companies that are dedicated to managing and distributing online advertising? Usually, these platforms put great controls that filter possible malware hidden in ads and malware strain is difficult. However, criminal networks have developed a strategy based on buying ad space safe passing filter platforms.

Once inside the advertising distribution circuit, they apply it to a small software update ad support, common, and that’s when they introduce malware and update requirement Flash Player. If you agree to update, you will go to the page of Adobe (owner of software company), but a virus that is responsible for abducting all computer files and encrypt them will activate.

An example of this type of virus, which also asks for money to release the files is Cryptowall. Discovered a year ago in various pornographic sites, it has surprised experts to be found again camouflaged in advertisements in the most used Flash format.

How to act

Thus, anyone can fall into the trap of ExtortionWare, if you are not careful enough and you look at what is a proposed upgrade. However, yes there are a number of strategies to avoid disappointment.

The first is that when you are prompted to upgrade Flash Player, which is something that happens with some regularity, we should not click the button automatically, but make sure the source of the pop-up window where the update request is trustworthy. If it is found that the URL that leads not match the Adobe page, avoid the apparent upgrade. It is best to force out the page where it is and even browser.

If there is a failure to detect fraud in time, pass to the second strategy to cut the action of the malicious software. To do this, you have to have a better firewall and have enabled antivirus. If you own a business, having a good IT support company managing your data’s security is ideal because you are assured that they will have the latest software to counter all of these said malware.

On the other hand, a good measure is to have one of the many file storage services in the cloud so that sensitive data have always had a backup that is isolated ExtortionWare attack. Sometimes, some of these viruses are also capable of attacking the files stored on the server platform, if not on time off the desktop version. Therefore, it is not more have an external hard drive and disconnect the system physically where periodically perform backups. This can be too much to handle for a single person especially if you have a lot of things to do so sometimes outsourcing help would be the best option as previously stated. There are a lot of emerging IT companies now in London, like this one, who offers 100% fool proof security for your files and data. All you have to do now is a bit of research to see which of the numerous companies would best fit your needs.

In no case should you yield to the pressure of the extortionists and pay for the rescue of the files because, in addition to promoting and funding this type of practice, the user is exposed to not see their settled lawsuit and undergo a sustained extortion in time. In all cases, you should report the incident to the Telematics Group Crimes of the Civil Guard and Technological Investigation Brigade of the National Police.

Comments are closed.