Everything you need to know about Ransomware Attacks

Posted by Roxane Suau on June 07, 2017

 

Ransomware attacks have recently made the headlines with WannaCry but, do you really know how they work? Here are the 4 steps of a Ransomware Attack.

 

ransomware-attack-phone-blog.png 

1. INFECTION

A Ransomware can attack computers, smartphones or tablets using different formats such as phishing emails, adwares or malicious applications. Once hosted, the malicious ransomware file can be triggered either remotely by the hacker, at a specific day and time or when the user performs a specific action.

2. BACKUP SPOLIATION

Once activated, the Ransomware may locate and remove the backup files to make any restoration impossible.

3. DEVICE BLOCKING

Depending on the category, a Ransomware can encrypt files, display a threatening message (overlay) or even modify the device unlocking password. In any case, the user cannot use his device. 

4. NOTIFICATION

The user is being informed that his files are being held up and is asked to pay a ransom. Usually, victims are given a few days to pay, after which the amount increases until files are eventually deleted when the timeout has been reached.

 


 

Learn how to prevent, detect and neutralize a Ransomware Attack with our solutions:

Mobile Threat Defense

App Security Testing

In-App Protection

Topics: news