The Atlanta Journal-Constitution

ARE YOU AT RISK?

- — ASSOCIATED PRESS

Here’s a look at how malware and ransomware work and what people can do if they fall victim to attacks.

WHAT ARE MALWARE AND RANSOMWARE?

Malware is a general term that refers to software that’s harmful to your computer, said John Villasenor, a professor at the University of California, Los Angeles. Ransomware is a type of malware that essentiall­y takes over a computer and prevents users from accessing data on the computer until a ransom is paid, he said.

How do computers become infected with ransomware? In most cases, the software infects computers through links or attachment­s in malicious messages known as phishing emails.

“The age-old advice is to never click on a link in an email,”said Jerome Segura, a senior malware intelligen­ce researcher at Malwarebyt­es, a San Jose-based company that has released anti-ransomware software. “The idea is to try to trick the victim into running a malicious piece of code.”

The software is usually hidden within links or attachment­s in emails. Once the user clicks on the link or opens the document, the computer is infected, and the software takes over.

BUT HOW DOES IT WORK?

“Ransomware, like the name suggests, is when your files are held for ransom,” said Peter Reiher, an adjunct professor at UCLA who specialize­s in computer science and cybersecur­ity. “It finds all of your files and encrypts them and then leaves you a message. If you want to decrypt them, you have to pay.”

The ransomware encrypts data on the computer using an encryption key that only the attacker knows. If the ransom isn’t paid, the data is often lost forever.

When the ransomware takes over a computer, the attackers are pretty explicit in their demands, Segura said. In most cases, they change the wallpaper of the computer and give specific instructio­ns telling the user how to pay to recover the files. Law enforcemen­t officials have discourage­d people from paying these ransoms.

HOW CAN IT BE PREVENTED?

The first step is being cautious, experts say. But Villasenor said there is “no perfect solution” to the problem. — ASSOCIATED PRESS

 ?? WSB-TV ?? “The average time an attacker is in a system before detection is 229 days,” a hacking consultant said.
WSB-TV “The average time an attacker is in a system before detection is 229 days,” a hacking consultant said.

Newspapers in English

Newspapers from United States