Whether they hack someone else’s computer on which to run the malware program, or deliberately set up a sacrificial laptop or virtual machine (software-based computer) of their own, the outcome is the same.
The point is that many ransomware samples, with no modification or reprogramming, needed, automatically scramble any connected drives they can see when the malware kicks off.
That pretty much guarantees that your C: drive will get zapped because almost every Windows user has one of those, but if you also have an S: drive, for example, mapped across the network to access the company’s shared server folders…
…then you can kiss all that data goodbye, too.
The servers get affected even though it’s you who’s infected.
In other words, if the crooks can find any devices on your network that have inadvertently been shared out on the internet, and if they can guess your password, then they can map your files as a shared drive on their sacrificial computer.
Then they can take you down with ransomware, without any malware infection ever showing up on your devices.
Those shared folders could be on your laptop or your NAS (network-attached storage) device, but the outcome is the same: an extortion demand offering to let you “buy” the decryption key to get your precious files back.
Learn how this sort of attack can happen, and how to stop it:
Contact us for more details for any support related to Ransomware or write to us at hello@gs-it.ae
Post a Comment