Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Nemucod and Ransomware Together could Cost Infected User a Fortune


Today we have an exponential number of contaminated electronic mails, says IT security firm ESET. Such electronic mails carry malevolent attachments that pull down ransomware to be planted onto the contaminated computers. The malware, if opened, blocks end-users' access to their folders and files by encrypting the data saved in them followed with demanding a ransom to decrypt the locked files. The downloader has been identified as JS/TrojanDownloader which pulls down Nemucod that records a remarkably high incidence of infections within North America, Europe, Japan and Australia.

The described electronic mails appear trustworthy because they assert as being invoices, court summoning notices, alternatively other kinds of formal documents. The purpose of these e-mails is to trick end-users in a way that they'd view the malevolent attachments which carry some JavaScript file that on execution pulls down and plants Nemucod onto the infected computer. It's widely known about Nemucod that it downloads many kinds of other malicious programs.

Anybody contaminated with both ransomware and Nemucod could eventually lose all his wealth. For making a better comprehension of the threat, the online site namely TechGig.com coordinated with malware researcher Artem Baranov of ESET Russia. Thehansindia.com posted this, March 23, 2016.

The downloader called Nemucod downloads crypto-ransomware making it no novel or unique downloader though.

Nemucod lets cyber-crooks utilize distributed architecture, carry out faster encryption as also make sure that nobody gets a hand on the decryption code kept on some remote server. It's expected that the trend would remain through 2016. Nevertheless, attackers would likely concentrate on the OS X system of Apple along with encryption of Mac files.

For remaining safeguarded against crypto-ransomware, it's most essential for maintaining backup of data-files routinely so that if files get hijacked the backup will fast provide the lost data. Another important tip is to utilize good anti-virus programs which stop the installation of ransomware executables onto end-users' PCs. There must also be routine update of the user computer's OS (operating system) along with each-and-every software program deployed so that ransomware, which usually gets installed via security flaws within the OS else other applications, would bear significant risk reduction of contamination.

ยป SPAMfighter News - 3/30/2016

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next