How did ransomware infect my network and computer?

“You can have the best security at home, guard dogs, security cameras, and gates – but if you leave the door open – these are rendered useless!’

With Makeup and other malicious Ransomware on the rise, we often get asked how did it happen with all the Firewall, anti-virus, and gateway security on the network?

Ransomware and other malware is primarily spread via spam campaigns, Trojans, software “cracking” (activation) tools, fake updaters, and untrusted download channels. “Spam campaign” is a term used to define the act of sending deceptive/scam emails on a large scale.

This mail is usually disguised as “official”, “priority”, “important” or similar. These messages have infectious files attached to or linked inside. The dangerous files can be in various formats (e.g. executable and archive files, PDF and Microsoft Office documents, JavaScript, etc.).

When they are opened, the infection is started (i.e., they begin download/installation of malware). Trojans are malicious programs capable of causing chain infections. Rather than activating licensed products, illegal activation (“cracking”) tools can download/install malicious software. Rogue updaters infect systems by exploiting flaws present in outdated programs and/or simply by installing malware rather than the promised updates. Malicious content is often downloaded from untrusted download sources such as unofficial and free file-hosting websites, Peer-to-Peer sharing networks (BitTorrent, Gnutella, eMule, etc.), and other third-party downloaders.

If you need further information, have suffered an attack, or want to know more about the correct backup and DR strategies we deploy for our clients – please get in touch at warren@storm-it.com

Start a conversation with us today. Let us simplify IT for you