RANSOMWARE
Attack Vectors
Unsolicited message conducting to Drive-by Downloads of malware via malicious URL-s
The social engineering technique of the message is very important and diverse:
Unsolicited message with infected attachments
Drive-by Downloads of malware from websites containing infected web objects
In the case where user interaction is needed, there is normally a webpage that informs that a browser extension or add-on needs to be installed, or that there is a software that is needed to visualize some active content and is missing. In some cases, the attack is so advanced that the executable is very similar in name and is eventually signed with a certificate that is either fake or expired, or even a valid certificate.
Prevention Tips and Advice
The infected objects are modified Java scripts, ActiveX, Download&install plugins etc. In this case the user has little interaction, the attackers taking advantage of the user naivety but also of vulnerabilities in various applications we are using daily: browsers, Java machine, Adobe Flash Player or Reader etc.
In the case where user interaction is needed, there is normally a webpage that informs that a browser extension or add-on needs to be installed, or that there is a software that is needed to visualize some active content and is missing. In some cases, the attack is so advanced that the executable is very similar in name and is eventually signed with a certificate that is either fake or expired, or even a valid certificate.:
There’s no reason to postpone training your employees
Get a quote based on your organization’s needs and start building a strong cyber security infrastructure today.