What is Virus ...?

What is Virus ...?

A computer virus is a program or piece of code designed to damage your computer by corrupting system files, wasting resources, destroying data or otherwise being a nuisance.

??????????????: like the ancient wooden horse full of attackers it takes its name from, this malware pretends to be harmless legitimate software, or comes embedded in it, in order to trick the user and open up the gates for other malware to infect a PC.

??????????????: with examples such as keyloggers, this kind of malware is designed to spy on users, save their passwords, credit card details, other personal data and online behavior patterns, and send them off to whoever programmed it.

??????????: this malware type targets entire networks of devices, hopping from PC to PC.

????????????????????: this malware variety hijacks files (and sometimes an entire hard drive), encrypts them, and demands money from its victim in exchange for a decryption key (which may or may not work, but it probably won’t).

????????????: this exceedingly irritating kind of malware floods victims with unwanted ads, and opens up vulnerable security spots for other malware to wiggle its way in.

???????? ???? ?????????????????????

Ransomware is a type of malware that encrypts or locks the victim's files or system, rendering them inaccessible until a ransom is paid. The attackers typically demand payment in cryptocurrency, such as Bitcoin, and threaten to delete or publish the files if the ransom is not paid within a specified time frame.

No alt text provided for this image

Ransomware can infect a computer or network through various means, such as email attachments, malicious websites, or exploiting vulnerabilities in software. Once the ransomware infects a system, it can spread rapidly and cause significant damage to the victim's data and operations.

???????????????????? ???? ?? ???????? ???? ?????????????????? ???????????? ?????????? ?????????????????? ?????????????? ???? ????????????????????????'?? ???????? ?????? ???????????? ?????????????? ???? ?????????????? ????????????.

There are different types of ransomware, including encrypting ransomware that encrypts the victim's files, locking ransomware that locks the victim out of their system, and doxware or leakware that threatens to publish sensitive data if the ransom is not paid.

Ransomware attacks work by gaining access to your computer or device, and then locking and encrypting the data stored on it.

?????? ???????? ???????? ????????????? It often happens when victims mistakenly download malware through email attachments or links from unknown sources which happen to be hackers.

?????????????? ???? ???????????????????? ???????????????

Ransomware?can spread across the internet without specific targets. But the nature of this?file-encrypting malware means that cybercriminals also are able to choose their?targets.

No alt text provided for this image

??Groups?that are perceived as having smaller security teams.?

??Organizations that can and will pay quickly.

??Firms that hold sensitive data.

??Businesses in the Western markets.

?????? ???? ???????? ?????????????? ?????????????? ????????????????????

??Always back up your data.

??Stay updated.

??Install reliable ransomware protection software.

??Never click on email attachments or links from unknown sources.

??Be cautious when online.

??Don't surf the web on?public wifi networks.

??Never use USB sticks from unknown sources.

???????????????????? ??????????

WannaCry is far and Firms that hold sensitive data the most severe malware attack so far in 2017, and the spread of this troubling ransomware is far from over. And it is not over yet, it is spreading on vast pace. So let’s dig a small check on this sweet little virus. The biggest Ransomware threats:

??Wannacry

??Cerber

??CryptoLocker

??Locky

?? Maze Ransomware

??Ryuk

???????? ???? ???????????????? ???????????????????? ???????????

It is a computer program which is designed to take hostage of your computer which is targeting the Microsoft Operating System. It holds the infected computer hostage and demands that the victim pay a ransom in order to regain access to the files on his or her computer.

?????? ???????? ?????????? ???????????

Before we start working on this virus we need to understand what is EternalBlue and DoublePulsar.

??????????????????????: It is a software developed (Believed to be) by US National Security Agency. In simple words, it is a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur on computer software, hardware, or something electronic. It is known as exploits.

????????????????????????: It is also an exploit, but it backdoor exploit. What it does, it bypasses normal authentication in a computer system. Unfortunately it is also developed by National Security Agency. DoublePulsar is often used for securing remote access to a computer, or obtaining access to plain text in cryptographic systems.

So our virus WannaCry uses both EternalBlue and DoublePulsar for hacking your device, which spread through network i.e. (Internet) which has not installed latest security updates.

Those still running exposed older, unsupported operating systems were initially at particular risk, such as Windows XP and Windows Server 2003, but Microsoft has now taken the unusual step of releasing updates for these.

The best way to prevent ransomware from hitting your computer is to first to prepare your machine with the following tips:

  1. Make an off-site backup.
  2. Use up-to-date version of Chrome or Firefox
  3. Keep Adobe up to date
  4. Don't open attachments from sources you don't know
  5. Don't open PDFs from sources you don't know
  6. Don't open attachments extension (exe, com, lnk, mhf, bat, ps1, scr)
  7. Don't click links in strange looking emails
  8. Don't use pirated software
  9. Disable macros
  10. Uninstall flash and java
  11. Use up-to-date anti-virus software

Ransomware is an online form of the bully’s game of keep-away. Here, the bully gets on your computer and takes your personal files: documents, photos, financial information, all the things you care about

1. Don't pay the ransom.

2. Don't click on attachments in email.?

3. Don't hesitate.

4. Don't assume your firewalls, spam filters, and antimalware will work perfectly.

5. Don't assume ransomware attacks will decline.

要查看或添加评论,请登录

Ibrahim S的更多文章

  • Git - Interview question

    Git - Interview question

    What is Git, and how does it differ from other version control systems? Answer: Git is an opensource version control…

    1 条评论
  • AWS - EKS

    AWS - EKS

    Amazon Elastic Kubernetes Service (Amazon EKS) is a fully managed Kubernetes service. Kubernetes is open source…

    1 条评论
  • Docker Volume

    Docker Volume

    ??Docker volumes are used for data persistence in Docker. So if we have a database or state full application, we would…

  • Content Creators Need To Avoid on Linkedin Mistakes

    Content Creators Need To Avoid on Linkedin Mistakes

    ?????????????????????? ???????? ????????????????: Your headline is the first thing people see. Craft a compelling and…

  • Kubeflow || SageMaker

    Kubeflow || SageMaker

    Kubeflow and Amazon SageMaker are both popular platforms used in the field of machine learning but they differ in terms…

  • Power of Digital Marketing

    Power of Digital Marketing

    In today's fast-paced digital landscape, businesses must adapt and embrace the power of digital marketing to thrive and…

    1 条评论
  • What Is Infrastructure as Code (IaC)?

    What Is Infrastructure as Code (IaC)?

    Infrastructure-as-Code (IaC) tools automate the management of IT infrastructure using programming languages and…

  • Remote Code Execution Attack (RCE)

    Remote Code Execution Attack (RCE)

    What is an RCE (Remote code execution) attack? It is a bug in a service receiving data from a network port that allows…

  • Active Directory - Azure

    Active Directory - Azure

    Azure Active Directory (Azure AD) is a cloud-based identity and access management service. Azure AD enables employees…

  • Network Protocol

    Network Protocol

    20 different network protocols commonly used in networking: 1. Transmission Control Protocol/Internet Protocol…

社区洞察

其他会员也浏览了