How to fight with the Hijackers of computers

Turning on the computer we find that before starting a message from an unknown security company warns us that our unit has been attacked by malware and can not be turned, so that only by applying the program they propose appears, we can eliminate the virus and unlock the computer boots. In fact, the supposed company is a front for cybercriminals who have cast us some kind of ransomware a malware that encrypts a high security protocol our files and programs and does not give us the decryption key if not paid. As explained below, this is just a strategy of many that apply hijackers computers can fight with some caution.

Sometimes, the ransomware notified that our team has been attacked by malware and can not be turned on, and only pay for the software they propose, you can remove the virus and unlock the boot device. But sometimes, these malware are not as elaborate in their messages and threatening to delete all files from your computer, or network of computers, where we are connected. If we are a professional or company that files important treasure accounting, planning, studies, AutoCad drawings, etc., the loss can be very burdensome, so we can raise pay the extortionists have encrypted these files.

This is the case of virus CryptoLocker that sneaks into computers and uses a 2048-bit RSA encryption, which has a public key and a private key. Of course, cybercriminals have both passwords, without which you can not access the contents of the encrypted files, and if we pay amounts around 400 to 600 euros, will not give us the public to access the files. Another virus is Cryptowall like.

In other cases, cyber criminals attack the user posing as police officers have been detected on your computer illegal items such as pornographic images or criminal acts, and blocked the system to ensure that evidence is not destroyed. Ensure that the person must pay a fine for possession and only then can unlock the device and clean.

How slip?

The ransomeware appeared as a major problem since 2009 and is believed to have been created by gangs of cybercriminals in Eastern Europe. These are programs that selectively encrypted files on computers they regard as important, or programs like the startup. We also make a high security protocol, which is impossible to break by brute force.

Hijackers computers1

On the other hand, encrypted possess a public key and a private key, and criminals are willing to assign to us private, to regain control of the computer or the files only when payment. Sometimes even not thereby give and continue with extortion following payment.

To enter our devices exploit browser vulnerabilities by getting introduce to download programs that did not ask or seek. The second step is to convince us that you download software that viruses are involved. They do this through social engineering, appealing to our naivete, ignorance, greed or curiosity. Sometimes, looking at adult sites or playing certain morbid videos, ask us we download a new video player or sound, which is actually the virus. If we agree to this, we will infect.

How to fight ransomware?

The first premise is cautious and method. We always do and frequently backup the contents of your computer or at least the files you deem important and irreplaceable. In the case of programs, it is very possible that if we lose we can retrieve a copy of free web developer.

Think that the maximum is not ever pay it is calculated that only 3% of those attacked and users pay up so the net benefit of offenders slashing $ 400,000 per month-and that if we lose our files infected. Thus, a current backup we can avoid big losses. The use of synchronization programs, files and folders as Google Drive or each respective operating system, especially Windows SkyDrive today OneDrive and iCloud in Mac OS X comes in handy to have backups always updated in “cloud”.

Yet we must be careful if programs like Dropbox are used, since it is possible that the virus also encrypt server copies. Dropbox makes available to its users a system to save the copy in the “cloud”. When using computers with the Windows operating system, you must have an antivirus always updated so quickly detect such files and prevent them. Microsoft has a special page devoted to this problem and how to avoid it.

On other operating systems, the infection is more difficult, but not impossible, if the download program supported and run it. Therefore, one should not rule out the use of some type of prevention, such as the use of white lists especially designed for computers running Mac OS X, or from anti ransom software, which warns that the virus is encrypting files. It is also important to prevent the attack through the smartphone, if you have synchronized with your computer.

Of course, the first barrier to this malware is never open programs that have not acquired by choice or not from an official page. In this sense, we must be very cautious with email attacks and issues of Phishing.

Leave a Reply

Your email address will not be published.