May 12, 2017 will be remembered for the biggest and deadliest international cyber-attack in the internet history, even bigger than the Dyn DDoS. Several big companies and nations came under serious threat of Ransomwere.
It is malicious software that carries out the cryptoviral extortion attack from cryptovirology that blocks access to data until a ransom is paid and displays a message requesting payment to unlock it.
In the first few hours, 200,000 machines were infected. Big organizations such as Renault or the NHS were struck and crippled by the attack.
Ransomware plays a simple trick to make life hell for most of the companies. The bizarre malware hacks your website and asks the owner to submit a sum of money to unlock it. It just not only locks down the files rather it encrypts the files which make it really impossible to crack open the locked files. As a result the users do not have any other way to regain access to their locked files but to pay the money and get the decryption code.
Wrong click on mail attachment and you have done the job for the malware. The attachments are sent mostly via spam mail. The extension of these files are different than the conventional files. Usually users turn off the file extensions, so they cannot know what kind of file they are clicking on.
Possible file extensions: .ecc, .ezz, .exx, .zzz, .xyz, .aaa, .abc, .ccc, .vvv, .xxx, .ttt, .micro, .crypto, _crypt, .crinf, .r5a, .XRNT, .XTBL, .crypt, .R16M01D05, .pzdc, .good, .LOL!, .OMG!, .RDM, .RRK, .encryptedRSA, .crjoker, .EnCiPhErEd, .LeChiffre, .keybtc@inbox_com, .0x0, .bleep, .1999, .vault, .HA3, .toxcrypt, .magic, .SUPERCRYPT, .CTBL, .CTB2, .locky or 6-7 length extension consisting of random characters.
Well, literally there is no solution for it as it encrypts the file which is impossible to open without entering the password. (ALSO READ: Key Characterstics of the Ransomware)
1. Keep your Operating System up to date.
2. Keep you Anti-Virus up to date.
3. Create back up for the most important files either in a secured hard drive or in a secured cloud storage.
4. Do not open any email attachments from unknown senders.
5. Be careful while opening and downloading from any unknown third party websites.