百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

Defence Against Ransomware

by Colin Yeung (OCIO)

?
What is ransomware? [1][2]

Ransomware is a form of malicious software (malware) designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. By encrypting these files and demanding a ransom payment for the decryption key, cybercriminals place individuals or organisations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.

In general, there are three major operational phases of ransomware: 

  1. Distribution and infection – The usual infection channel is that cybercriminals may send phishing emails to targeted victims with attachments containing ransomware or trick the users into clicking the link embedded in the emails. Another common infection channel is that users execute files downloaded from the Internet. Once infected, the infected computer can also propagate and infect computers on the same network.
  2. Data and file encryption – After ransomware has gained access to a system, it can begin encrypting its files. Since encryption functionality is built into an operating system, this involves accessing files, encrypting them with an attacker-controlled key, and replacing the originals with the encrypted versions.
  3. Demand for ransom – Once file encryption is completed, the ransomware is prepared to make a ransom demand. It is very common to have a display background changed to a ransom note or text files placed in each encrypted directory containing the ransom note.
ransomware-1.png

Figure 1:  The 3 Phases of Ransomware Attacks

What is the latest situation? [3][4]

Ransomware is among the most detrimental and widespread cyber security threats. Latest observation includes cybercriminals performing double extortion to the victims. Apart from encrypting all user files, including connected shared folders and storage devices, cybercriminals may exfiltrate sensitive information to a separate location for other purposes. For instance, if a ransom payment is not received, cybercriminals may leak the information to a public website or sell it to others.

ransomware-2.png

Figure 2: A sample notice of a popular Ransomware (Conti)

How does it impact us? [5][6][7]

On a personal level, the cyber-attack can lead to the loss of timely access to important data. Victims may also experience financial loss due to paying the ransom. The business could be seriously affected at the organisation level as the information system and underlying business data are no longer available for business users. An organisation's reputation could be damaged due to service unavailability, data breaches and/or potential financial penalties from regulatory authorities. Security researchers revealed that in 2021, the average ransom demand has increased by 144% over 2020. However, even if someone is willing to pay the ransom, it does not guarantee that the encrypted files can be restored to their original status. The organisation will also suffer from financial loss for business recovery. 

What preventive measures can we take? [8][9]

  1. Install security patches to the operating system (OS) and maintain up-to-date computer software.
  2. Install and enable real-time protection of anti-malware software. It is worth noting that CityU staff and students are eligible to install Sophos Endpoint Protection software on their personal devices. [10]
  3. Perform data backup regularly and keep an offline copy.
  4. Do not open emails or download files from untrusted sources.
  5. Do not plug in and use USB devices from unknown sources.

What to do if infection is suspected?

  1. Immediately disconnect the infected system from the network to prevent infection propagation.
  2. For current CityU staff and students, please report the incident and seek proper advice from the IT Service Desk. [11]
  3. For the general public, affected users can report the incident to Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT). [12]
  4. Restore data from backup to a clean device.

For enquiry related to this article, please write to infosec@cityu.edu.hk.

References

[1] https://www.cisa.gov/stopransomware
[2] https://www.checkpoint.com/cyber-hub/threat-prevention/ransomware/
[3] https://www.hkcert.org/blog/ransomware-evolved-double-extortion-and-fake-decryptor
[4] https://www.itpro.co.uk/security/ransomware/367624/the-rise-of-double-extortion-ransomware
[5] https://start.paloaltonetworks.com/unit-42-ransomware-threat-report.html
[6] https://inews.hket.com/article/3364739/
[7] https://threatpost.com/true-impact-of-ransomware-attacks/168029/
[8] https://www.infosec.gov.hk/en/best-practices/business/handling-malware-outbreak
[9] https://www.infosec.gov.hk/en/knowledge-centre/ransomware
[10] http://www.ncm2.xyz/csc/deptweb/facilities/sophos.htm
[11] http://www.ncm2.xyz/its/services-facilities/it-service-desk
[12] https://www.hkcert.org/form/incident-report-end-user-sme/entry

博E百百家乐官网现金网| 注册百家乐送彩金| 烟台市| 做生意店子内风水布置| 百家乐五湖四海娱乐城| 皇冠现金网骗人| 海立方百家乐官网客户端| 百家乐官网翻天qvod粤语| 百家乐视频小游戏| 必博网| 澳门百家乐路子分析| 百家乐娱乐城优惠| 皇冠走地| 百家乐顶路| 呈贡县| 威尼斯人娱乐城开户地址| 大家旺百家乐官网娱乐城| 沙巴百家乐现金网| 大发888游戏注册| 沙龙百家乐官网代理| 迪威百家乐娱乐平台| 大发888娱乐城 真钱bt| 易球百家乐官网娱乐城| 反赌百家乐的玩法技巧和规则| 大发888开户注册网站| 澳门百家乐官网小游戏| 最佳场百家乐的玩法技巧和规则| 百家乐官网2号机器投注技巧 | 百家乐官网试玩1000元| 来博百家乐现金网| 百家乐官网最佳投注法下载| 试玩百家乐1000| 星期8百家乐官网娱乐城| 九头鸟棋牌游戏中心| 川宜百家乐官网分析软件| 金木棉百家乐的玩法技巧和规则 | 裕昌太阳城业主论坛| 自贡百家乐官网赌场娱乐网规则 | 赌百家乐2号破解| 三元风水24山水法| 赌博百家乐官网探讨|