|
[p][br][header][img alt="7 Types of Ransomware That Will Take You by Surprise" src="https://static.makeuseof.com/wp-content/uploads/2018/04/ransomware-surprise-670x335.jpg" itemprop="image" srcset="https://static.makeuseof.com/wp-content/uploads/2018/04/ransomware-surprise.jpg 1680w,https://static.makeuseof.com/wp-content/uploads/2018/04/ransomware-surprise-1100x600.jpg 1100w,https://static.makeuseof.com/wp-content/uploads/2018/04/ransomware-surprise-644x373.jpg 644w, https://static.makeuseof.com/wp-content/uploads/2018/04/ransomware-surprise-297x141.jpg 297w"][iframe width="326" height="100" frameborder="0" marginwidth="0" marginheight="0" vspace="0" hspace="0" allowtransparency="true" scrolling="no" allowfullscreen="true" onload="var i=this.id,s=window.google_iframe_oncopy,H=s&&s.handlers,h=H&&H,w=this.contentWindow,d;try{d=w.document}catch(e){}if(h&&d&&(!d.body||!d.body.firstChild)){if(h.call){setTimeout(h,0)}else if(h.match){try{h=s.upd(h,i)}catch(e){}w.location.replace(h)}}" id="aswift_0" name="aswift_0"][/iframe][/header][div][div itemscope="" itemtype="http://schema.org/Article"][div itemprop="articleBody"][p]You know how it goes: you’re browsing the web, or checking an email, when all of a sudden a message pops up. Your computer, and the data on it, is locked—encrypted by ransomware. Access is denied until you pay the ransom.[p]Most people know the procedure with ransomware, which is why the criminal coders behind it are finding new and inventive ways to make you pay up. Here are some new types of ransomware that you should be aware of.[h2]1. Talking Ransomware[/h2][p]If your computer is infected with the Cerber ransomware (typically via an email attachment posing as aMicrosoftOfficedocument), your data will be encrypted, with each file given a new file extension:[strong].cerber[/strong].[p][strong]Note:[/strong]Unless you’re in Russia or the Ukraine, or other former USSR nations, such as Armenia, Azerbaijan, Belarus, Georgia, Kyrgyzstan, Kazakhstan, Moldova, Turkmenistan, Tajikistan, or Uzbekistan. If you are situated in these locations, the Cerber ransomware will deactivate[p][br][h2]2. Play Our Game… Or Else[/h2][h2][p]In April 2018, we saw the[a href="https://www.pcgamer.com/a-new-kind-of-ransomware-forces-you-to-play-pubg-to-unlock-your-files/" target="_blank" rel="noopener" sl-processed="1"]PUBG Ransomware[/a]which took a different approach to holding your computer to ransom. Rather than demand money for your locked files, the coder behind this odd piece of malware gives you a choice:
[/h2][h2][br][/h2][h2]3. I’ll Delete One File at a Time[/h2][h2][p]Jigsaw deletes your files, one by one.[div id="div-gpt-ad-1510565681811-2"][div id="google_ads_iframe_/1065821/in-content_2_0__container__"]As if it wasn’t bad enough having all your data locked in an unknown state of existence, the Jigsaw ransomware takes the scam further. Originally known as “BitcoinBlackmailer,” this ransomware gained a new name thanks to the appearance of Billy the Puppet, as seen in the Saw “torture porn” movie series.[/div][div id="google_ads_iframe_/1065821/in-content_2_0__container__"]
[/div][div id="google_ads_iframe_/1065821/in-content_2_0__container__"] Image credit : wikimedia[/div][div id="google_ads_iframe_/1065821/in-content_2_0__container__"][br][/div][/div][/h2][h2]4. Oh, You Paid Already? Tough[/h2][h2][div][div id="google_ads_iframe_/1065821/in-content_2_0__container__"][p]We’re familiar withhow ransomware works. You get infected with malware that encrypts your vital data (or entire computer), then forces you to pay a ransom to unlock. Your files are then back in your hands via a decryption key. Right?[p]Just when you thought everything was straightforward with ransomware comes an example that just takes the money and runs. Oh, and they don’t even bother to encrypt your data as part of the pretense—your data is deleted.Usually, but not with Ranscam.[/div][/div][/h2][h2]5. Yes, We Locked Your TV[/h2][h2][div][div][p]In June 2016 it was discovered that the FLocker ransomware (ANDROIDOS_FLOCKER.A) that had previously hit Android phones andtablets, had evolved. Android-powered Smart TVs were added to its list of targets.[p]
[br][/div][/div][p][br][/h2][/div][/div][/div] |
|