How Ransomware Works To Harm Big Companies
How ransomware works (photo: Doc. pexels).

أنشرها:

YOGYAKARTA - The case of ransomware attacks is increasing and breaking through the highest point of all time. Ransomware is one type of cyber crime that attacks the computer system. This digital crime is often launched to steal or break into important data from large companies. To prevent and be aware of it, it is necessary to know how ransomware works.

According to a Malwarebytes report, there has been a massive spike in ransomware cases from July 2022 to June 2023. The United States (US) has become the country that experienced the largest attack from cyber crime ransomware. From data on 1,900 ransomware cases, it was recorded that more than 43 percent occurred in the US and the percentage increased 47 percent from last year.

The increase in ransomware attacks also occurred in major European countries, namely the UK, Germany and France. Cybercrime is also likely to spread to other countries in Asia. In order not to become the next victim, the public needs to know how ransomware works to avoid and prevent it.

Ransomware is a malicious software or malware that attacks computer systems to block access to victims' data. Usually, once the perpetrator (hackers) succeeds in a ransomware attack, they will ask for ransom from the victim. This cyber crime is done through several stages or how it works as follows.

Ransomware utilizes certain infection methods to hack targeted data systems. One method commonly used is via phishing attacks via email, where the content contains links to websites that download malicious material. In addition, another method is to attach files containing hidden download links.

If the target is caught in an infection network, Ransomware can be run by cybercriminals. Without your knowledge, Ransomware will be installed on your device and start remote access to all the content in it.

Once access is achieved, Ransomware will encrypt data. This encryption process is carried out using a key controlled by the attackers. This encryption key is generally controlled through Server Command and Control.

Most types of Ransomware carefully select files that will be encrypted to maintain system stability. Some types of Ransomware can even delete backup copies and file copies to ensure that data cannot be recovered without encryption keys. Ransomware can target different types of storage, both in local devices and in cloud storage services.

After the encryption process is complete, the perpetrator will send a ransom request to the victim. This request is usually a different notification depending on the type of Ransomware used by the attacker.

The notification will include details of the ransom that are often inserted in each file that is successfully encrypted by the perpetrator. The ransom request generally has to be paid in the form of a cryptocurrency, according to the amount determined by the perpetrator and must be done before a certain time limit.

If the perpetrator's request is met, the victim will receive further instructions from cybercriminals. Usually, the perpetrator will provide a copy of the private key that can be used in the decryption program to restore access to the victim's data system.

That's how ransomware works that needs to be known to be able to avoid and prevent this dangerous cyber crime. Several steps can be taken to prevent it, namely to be aware of suspicious advertisements or links, not to open unofficial systems, or always activate firewalls and antivirals.

Stay up to date with the latest domestic and other overseas news on VOI. You present the latest and most updated nationally and internationally.


The English, Chinese, Japanese, Arabic, and French versions are automatically generated by the AI. So there may still be inaccuracies in translating, please always see Indonesian as our main language. (system supported by DigitalSiber.id)