Don’t be held at ransom with Ransomware threats

Although ransomware isn’t a new thing, many users still find themselves victimized by it without knowing how their device got infected. They could have downloaded ransomware unknowingly by visiting malicious or compromised websites, or it could have been dropped or downloaded into their systems by other malware. Paying the ransom however, does not guarantee that users will regain access to their digital assets.

“Though crypto-ransomware detections are prevalent in regions like North America and Europe, we have noted a spike in incidences outside of these territories. Much interest in the Critroni or Curve-Tor-Bitcoin (CTB) Locker—an old crypto-locker variant—is already being noticed in Asia. Though the number of detections in these new territories is not as large, it can still be a precursor for more widespread crypto-ransomware incidents in the near future,” commented Ihab Moawad, head of MMEA, Trend Micro.

It is a type of ransomware that encrypts a user’s system or files in exchange for money. This prevents a user from accessing his files or computer. The CTB Locker directly asks for you to pay in Bitcoins in exchange of your data.

- The common CTB Locker asks the user to pay 3 Bitcoins (USD 732.95)
- It does not require the Internet to encrypt files; it can function even without a connection.
- It supposedly offers free decryption for five files.
- It extends the ransom deadline for encrypted files.
- It gives its victims language options for the ransom message.

While the region might not be under immediate attack, research from Trend Labs indicates the malware has plagued several systems in neighbouring countries. It is, hence, of paramount importance that organizations act swiftly and update their systems.

Do not forget to back-up your data, preferably on a different media source. Most importantly, clicking on unknown links should be avoided, since malware infection is most likely by doing so.
Though the promise of getting data back by paying ransom is tempting, one should refrain from it. More often than not, chances of retrieving the encrypted data are slim even if they pay. The best way to protect against this type of ransomware is through prevention.

 


About Trend Micro
Trend Micro Incorporated (TYO: 4704), a global leader in security software, strives to make the world safe for exchanging digital information. Our solutions for consumers, Trend Micro™ Smart Protection Network™ provide layered content security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. Leveraging these solutions, organizations can protect their end users, their evolving data center and cloud resources, and their information threatened by sophisticated targeted attacks.

All of solutions are powered by cloud-based global threat intelligence, the Trend Micro™ Smart Protection Network™, and are supported by over 1,200 threat experts around the globe.

For more information, visit www.trendmicro.com/en_ae/. Or follow our news on Twitter at @trendmicro_mea.