It seems a new virus or malware threat is appearing almost every month, and even every week at times. Of course, that isn’t literally true. It’s the continual repetition of news stories which makes such an impression. However, that does not mean warnings should be ignored. Often, stories about a new cybersecurity breach or virus threat is continually republished to ensure the news spreads to everyone potentially concerned with these dangers. And they concern anyone who uses a computer and goes online.
The open-source journal wikipedia cites monstercloud.com as a source of information on the latest two ransomware viruses to appear on the scene. These are Dharma and Wallet. These are both new versions of CrySis, a particularly pernicious ransomware virus which has plagued computer users in recent times. Dharma and Wallet are designed around an encryption algorithm which generates a unique key for each file that is infected. Naturally, all infected files are locked up. This includes applications as well as data files, which means the computer system is rendered useless.
The victim finds a ransom note in the files containing each encrypted file. This text file or document contains ransom instructions, threats that will follow if law enforcement is contacted, and the empty promise of e-mailing the decryption key to unlock all infected files. It follows that the malefactors cannot be trusted to keep these promises, nor can a victim be confident that there won’t be a future such ransomware attack. And each person who does yield to blackmail helps embolden these saboteurs to stalk and attack other victims.
As is the case with all malware attacks, the virus is encased within an attachment appended to an e-mail. The suspect attachment can appear as an innocent text file, a weblink, an image file or a .pdf. It matters little what form the disguise takes. The attack is predicated upon the would-be victim’s own carelessness in not closely examining the source e-address of the trojan file. Cybercriminals are clever in masking trojan e-mails as originating from a supposedly legitimate source.
Basic security involves taking simple, common-sense precautions. One of these is to be certain that an e-mail is actually from a legitimate contact. In the event of an infection, however, the last thing to do is to pay the criminals. Contact professional cybersecurity experts who have the software which can neutralize these viruses and restore your lost data.