2024 Unraveling the Mechanics of Ransomware: Understanding the Inner Workings of Data

 6. Blackmail

At this point, the hacker will ask to pay for the key to open the data. Normally, hackers will leave the key on the victim's system and then encrypt that key. Hackers will pack all the keys into a box. When paying, the hacker will give the password to open the box to get the key.


7. Money laundering


Currently, hackers often choose to pay in cryptocurrency to hide their crimes.


8. Repeat the attack


Hackers can repeat the attack with other victims or with the same victim. When they first get money, hackers will know the victim has the ability to pay.


Hackers may return to attack in the name of one group or another. This is a destructive form of attack. The victim not only lost money but also became a constant target of bad actors.


How does a ransomware data encryption attack work? - 2

On April 6, the Department of Information Security (Ministry of Information and Communications) published "Handbook for preventing and minimizing risks from ransomware attacks" (Illustration).


Faced with the increasing situation of extortion data encryption attacks in Vietnam, on April 6, the Department of Information Security (Ministry of Information and Communications) published "Handbook for preventing and minimizing risks". risks from ransomware attacks".


This handbook will be a useful document to help agencies, organizations, and businesses proactively prevent and protect their important information systems against potential cyber attack risks.


Watch More See many hot photo albums >>>

Đăng nhận xét

Mới hơn Cũ hơn