Welcome to WordPress. This is your first post. Edit or delete it, then start writing!
The quest to ensure security and data integrity of an organization is becoming every day a complex task for security professionals. Every day there are new threats that seek to exploit vulnerabilities in computer environments, requiring a multidisciplinary a security professional. However, many companies still focus their investments on perimeter solutions such as firewalls. An investment, especially in the training of security professionals as well as pro-active and intelligent solutions that seek the protection of more complex attacks is required.
In this scenario the digital fraud has been consolidated as one of the main forms of cyber attacks. Malware with the objectives of the kidnapping and rape of data are the main threats to the technological environments of today. Below we will present some of these threats.
Rombertik is a highly sophisticated malware and has a peculiarity, when you find evidence detection actions against it in an already infected system, it self-destructs, committing all the victim’s disk data. In addition to infect the hard disk boot sector (MBR), the malware directly affects the partitions and replace your data by zero information, making it virtually impossible to recover the data. Its propagation is performend trough spam and phishing messages. Acts directly on the user’s browser in a search of sensitive information.
Blastware, was named as one of the main threats for companies of security solutions for 2015. It allows an attacker to access a system, collect data and remove the disc information to hide the traces. It was observed in 2014 that their proliferation was given in the form of Dorkbot and NGRbot malwares.
The kidnapping of data from a hard disk through the use of encryption are Ransomware malware characteristics. The Ransomware is used in a very efficient encryption algorithms to compress files and directories that will be protected by a password. The password will only be delivered when the victim deposit a certain sum of money (or bitcoins), or buy a particular product. Examples are: Arhiveus Ransomware-A and CryptoLocker.
Several studies show that these attacks and their variables are widely used in personal devices such as tablets and smartphones. Worth to protect and ensure always updated backups.