Blog Layout

Levy Olvera • September 13, 2023

101 | Communications and Network Security | Ransomware

A digital extortion scheme

Greetings mate! Here is a short introduction to the world of ransomware. Buckle up as we unravel the complexities of this digital menace.


Understanding Ransomware at a Technical Level


Ransomware is a digital extortion scheme, where cybercriminals take control of a computer or a network and demand a ransom (usually in cryptocurrency) in exchange for restoring access or decrypting data. Here's how it works under the hood:


1. The Initial Infection: Ransomware typically infiltrates a system through malicious email attachments, compromised websites, or vulnerabilities in software. Once inside, it quietly begins its work.



2. Encryption: The core of ransomware's operation is encryption. It employs strong encryption algorithms to lock up files, making them inaccessible without the decryption key. In simpler terms, it's like putting your data inside a digital vault and locking it with an unbreakable code.


3. Ransom Note: After encryption, the ransomware displays a ransom note on the victim's screen. This note includes instructions on how to pay the ransom and usually has a countdown timer, adding pressure to comply.


4. Payment and Decryption: If the victim decides to pay the ransom (which is not recommended), they send cryptocurrency to the cybercriminals' wallet. In return, they receive the decryption key, allowing them to unlock their files.


5. The Risk of Non-Payment: Some ransomware strains threaten to permanently delete the decryption key if the ransom isn't paid within a certain timeframe, leaving the victim with no way to recover their data.


Preventing and Mitigating Ransomware Attacks


1. Regular Backups: Implement automated and regular backups of critical data. Ensure that these backups are stored offline and are not accessible from the network to prevent them from being encrypted by ransomware.


2. Software Patching: Keep all software and operating systems up to date. Most ransomware exploits known vulnerabilities, so patching can prevent infection.


3. Security Awareness: Train employees to recognize phishing attempts and suspicious emails. Most ransomware enters a system through user interactions.


4. Email Filtering: Employ email filtering solutions to block known malicious attachments and links.


5. Network Segmentation: Segment your network to limit lateral movement in case of an infection. This can help contain the ransomware's spread.


6. Endpoint Protection: Use robust antivirus and anti-malware software on all endpoints to detect and prevent ransomware infections.


7. Incident Response Plan: Develop a detailed incident response plan that outlines the steps to take in case of a ransomware attack. Quick action can minimise damage.


Ransomware is a formidable adversary in the world of cybersecurity, but with the right knowledge and preventive measures, IT specialists can protect their organisations from falling victim to these malicious attacks. Stay vigilant, keep systems updated, and always have a plan in place for the worst-case scenario.


Sources and further reading.


Harris, Shon & Maymí, Fernando. CISSP EXAM GUIDE Seventh Edition. New York McGraw Hill Education, 2016.

Ransomware | NIST. (2022). NIST. https://www.nist.gov/itl/smallbusinesscyber/guidance-topic/ransomware

Share by: