Most of this page uses content from Wikipedia. The original article was at Ransomware (malware). The page may have contained some inaccurate or outdated information, so please edit it so it contains better information. The list of authors can be seen in the page history. As with Ransomware Wiki, the text of Wikipedia is available under the Creative Common Attribution-ShareAlike 3.0 License. Remove this template when most of the Wikipedia content has been removed or the Wikipedia information is outnumbered by non-Wikipedia information. |
Ransomware, sometimes known as cryptovirus, cryptotrojan, lockvirus, encryptor virus, or cryptoworm is a type of malware that makes the data belonging to an individual on a computer inaccessible in some way, demanding a ransom for its restoration, hence the name. The term ransomware is commonly used to describe such software, although the field known as cryptovirology predates the term "ransomware"
This type of ransom attack can be accomplished by (for example) attaching a specially crafted file/program to an e-mail message and sending this to the victim. If the victim opens/executes the attachment, the program encrypts a number of files on the victim's computer. A ransom note is then left behind for the victim. The victim will be unable to open the encrypted files without the correct decryption key. Once the ransom demanded in the ransom note is paid, the attacker may (or may not) send the decryption key, enabling decryption of the "kidnapped" files. Often the attacker does not send the key or can't thereby earning the attacker money but leaving the victim's computer useless
The idea of maliciously encrypting plaintext is not new. The first example is probably the PC Cyborg trojan that was found in 1989. It encrypted only filenames (using a very weak symmetric cypher) causing the file system to be corrupted. There have been other malware attacks that have maliciously encrypted plaintext since then. The 1996 IEEE paper by Young and Yung reviews the malware that has done this and shows how public key cryptography may be used in such threats.
Ransomware is defined as malware that contains and uses the public key of its author. In cryptoviral extortion, the public key is used to hybrid encrypt the data of the victim and only the private key (which is not in the malware) can be used to recover the data. This is one of a myriad of attacks in the field known as cryptovirology. This can make people millions of dollars for their Ransomware.
Currencies[]
Ransomware will commonly expect you to pay in these following formats:
- BitCoin
- MoneyPak
- PayPal
Notable Ransomware[]
- Cryptolocker
- MBR Ransomware
- Locky
- WannaCry
- FBI Moneypak
External Links and References[]
- SecuriTeam article: "Ransomware" as a buzzword, and Internet-based extortion, published September 27th, 2005
- PC World article: Trojan Freezes Computer, Demands Ransom, published April 27, 2006
- Betanews article: Trojan Demands Ransom from Victims, published April 27, 2006
- BBC article: Woman targeted by web Crackers, published 31 May 2006
- Ars Technica article: New Trojans: give us $300, or the data gets it!, published July 18, 2007
- DoesWhat article: Your holiday snaps… up for ransom, published June 6, 2008
- BestAntivirus.Reviews article: Ransomware Protection Guide , published July 7, 2016
- HowToGeek article: http://www.howtogeek.com/174343/ransomware-why-this-new-malware-is-so-dangerous-and-how-to-protect-yourself/
- MakeTechEasier article: https://www.maketecheasier.com/what-is-ransomware/
- Norton article: http://ca.norton.com/yoursecurityresource/detail.jsp?aid=rise_in_ransomware
- Heimdal Security article: https://heimdalsecurity.com/blog/top-financial-malware/