Date: May 7, 2015 Category: Questions from the audience, Featured Articles, Featured Articles mobile, Gallery 24, the list of IT 24 hours, technology Labels: cyber crime, e-mail, how-to, Key Encryption, race 2 malware. , ransomware, virus, worm, procedures, ransom, decoding, issues, methods, prevention, encryption, application ransom.
In an era where almost everything was digitalize (stored race 2 in a digital format), whether to ease processing, query and access to the results of the use of any system easier. Whether your photos Which can be kept for longer, with better resolution. Or working through a spreadsheet that can help various calculations. Faster And other storage, which can be easier then. Also can store large quantities in a device smaller than your palm. The resulting portability. race 2 And become part of the lives of the people. And at this point is that compromise can be a strange way to make money, which is to capture race 2 as hostages for ransom. Through a malicious program called "MalWare" a type of "Ransomware" or "application ransom" that the form of ransom Ransomware.
The work of Ransomware is available in two major forms together race 2 Lockscreen Ransomware and ransom this program Ransomware will function Lock Screen of the device operating system that Ransomware (both Computer and Mobile), race 2 we do not. Interface regular access to the device. Application to run or access any data, but the data and Application not been touched at all. Files-Encrypting Ransomware and ransom, this user can use the device and user application normally, but Ramsomware be used to encrypt the file. (English folklore is the log file), users can access their own files.
But for Option 2. In Ramsomware new version (also known CryptoWall, CryptoLocker, CryptoDefense and TeslaCrypt) was developed to be difficult to resolve. The easiest way to decrypt the files was to pay criminals. (The ransom was a crime) made the ransom itself.
When Ransomware started working on the computer of a target. The steps below to encrypt files and ransom from the victims installation (Installation), the program installs itself onto your computer, including the setting itself to run every time the computer starts. Connect to Command & Control Center (C & C) Command race 2 & Control Center is the central control Ransomware data collection and key for decryption of the computer each victim, which Ransomware will contact the C & C to be before any action. The following identifies the target machine and build key to encrypt the file on the target machine Ransomware is installed on each victim. When dealing with C & C, and then take steps to identify who is who, through a procedure called a handshake, then it will create a key that will be used in Asymmetric Key Encryption (to be discussed in more detail later). To encrypt race 2 files on a victim's machine to the 2 key 2 key is being called Public key and Private key Public key, which is key to encrypt and send them to the victim's machine to be used to decrypt the Private Key. Are stored at C & C using key 1 pair per victim first encoder files on the target machine when Ramsomware have made arrangements with C & C, and Public Key sent to the victim's machine, then Ransomware will find the files it thinks. with a focus on the use of such images (eg. jpg, .gif, .png), video (eg. avi, .mpeg, .mov), documents, office (such as. doc, .docx, race 2 .xls, .xlsx). by File extension or the extension itself. race 2 Then encrypts all files through the RSA Algorithm using a Public Key encryption keys. Technically, encrypted files will still be readable. But not in the way it used to be. And incomprehensible For general Your file does not work then. Show to extort race 2 property race 2 (Extortion) race 2 after Ransomware Encrypts files successfully. A screen is displayed warning the user that the file is encrypted and can not be used. And must pay the amount demanded by Ransomware is a Private key used to encrypt them. If not, it will delete the Private Key left and can not access the files anymore.
In general, if we compare it with the lock master key to encrypt it. It is not uncommon to see the lock and unlock the lock with a key, a single flower. The coding principle race 2 is called Symmetric Key Encryption Figure 3.
The weakness of Symmetric Key Encryption keys are distributed to those involved because the key used to encrypt and decrypt the key is that, if leaked to the submission or at any given time will affect the confidentiality of the data.
For this reason, Asymmetric Key Encryption was invented to overcome the weaknesses of Symmetric Key Encryption using mathematical functions. The encoder and decoder must be made through the key (Key) each by two Key, if one uses encrypted. Another need that was built only a couple of decoding. This one is being kept secret called the Private Key and the other is a Public Key Public Key Now, if revealed, whether by reason. It will not affect the data.
No comments:
Post a Comment