EIT Networks
Menu
  • Home
  • EIT-TV
  • Blog
  • About
  • Services
  • Shop
  • [Client Portal]
  • 0 items
    • your cart is currently empty
EIT Networks

Ransomware Adopting Self-Replication

  • Home
  • Blog Page
  • AntiVirus
  • Ransomware Adopting Self-Replication
  • June 14, 2016
  • Daniel Hendrix

Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible risk of infection.

 

Ransomware, the malware that locks up infected systems and demands payment to return access to users, has been steadily increasing its infection rate over the course of this year. Enigma Software reported that, “After staying steady for the last six months of 2015, ransomware detection has begun to climb; February saw a 19 percent increase over January, while March had almost a 10 percent increase over February. Then, in April, infections more than doubled.”

 

And as if that wasn’t frightening enough, Microsoft announced last week that a recently detected ransomware software was found copying itself onto USB and network drives. The ransomware, titled ZCryptor, disguises itself as either an Adobe Flash installer or a Microsoft Office file to trick users into opening it.

 

Once opened, it displays a prompt that says “There is no disk in the drive. Please insert a disk into drive D:”. If you see this after opening a suspicious file, it is most likely ZCryptor trying to distract you while it works in the background to add a registry key that buries itself deep in your system and begins to encrypt your files.

 

Although previous ransomware iterations like Alpha Ransomware had the ability to find and encrypt files on shared network drives, security experts believe this is the first time a ransomware variant has included self-replication via removable drives into its framework.

 

When it was first detected in May, Microsoft found ZCryptor singling out 88 different file types for encryption. However, later on a security expert analyzed the ransomware and found 121 targeted file types — inferring that creators of the malware were continuing to develop its source code.

 

It’s commonplace for ransomware to demand payment to be made in Bitcoins as they’re an almost totally untraceable online currency. ZCryptor is no different, demanding 1.2 Bitcoins (500 USD) unless payment is more than four days after infection — then it increases to five Bitcoins (2,700 USD).

 

Compared to other more complex security threats, ransomware is still relatively easy to avoid. Always verify the source of email attachments and website downloads before opening files, disable macros in Microsoft Office programs, maintain regular backups and update your security software.

 

Still concerned about security at your SMB? It doesn’t have to be as difficult and draining as you may think. Contact us today for advice on keeping your network protected around the clock. Reach us at 1-866-BIT-WISE or sales@eitnetworks.net

Posted in AntiVirus, Malware, SecurityTagged ransomware, zcryptor

Recent Posts

  • Reasons to back up your mobile devices
  • Get More Life From Your iPhone Battery
  • How to Guard Against Scareware

Archives

Categories

Recent Comments

  • Daniel Hendrix on Simple Tips on Wireless Security
  • Dennis Cockrell on New iPad, Same Name but Slightly Different
  • Keith Storm on New iPad, Same Name but Slightly Different
  • Dennis Cockrell on Is the Windows Desktop PC a Dinosaur?
  • Daniel on Is the Windows Desktop PC a Dinosaur?

Latest Posts

  • Reasons to back up your mobile devices
    Reasons to back up your mobile devices
  • Get More Life From Your iPhone Battery
    Get More Life From Your iPhone Battery
  • How to Guard Against Scareware
    How to Guard Against Scareware

Categories

  • Android
  • AntiVirus
  • Apple
  • Applications
  • BDR/Business Continuity
  • Business Philosophy
  • Email
  • Firefox
  • Firewalls
  • General Tech
  • Google
  • Google Chrome
  • Internet Explorer
  • iOS
  • IT Managed Services
  • Malware
  • Microsoft
  • Microsoft Office
  • Mobile Devices
  • Outlook
  • Paperless Office
  • PC
  • Printing
  • Security
  • Smartphones
  • Social Media
  • Software Applications
  • Technology
  • The Cloud
  • Uncategorized
  • Virtualization
  • VOIP
  • Wi-Fi
  • Work Habits

Tags

365 Amazon Android Apple battery browser Business Chrome comments communication Computer computers customers Cybersecurity El Capitan extensions Facebook feedback Google work Input Device iPad laptop Marshmallow Mouse Office online payment PC Build performance phone plugins ransomware reviews samsung samsung pay security Shopping Smart Phone social media Software tablet tag1 Tech jargon Virtualization voip Windows 10
EIT Networks
Welcome to our website. Let us know if you need anything while you're here.
Explore
  • Home
  • EIT-TV
  • Blog
  • About
  • Services
  • Shop
  • [Client Portal]
  • 0 items
    • your cart is currently empty
  • Managed IT
  • Cyber Security
  • Disaster Recovery
  • E-Waste Recycling
  • Cloud Services
  • IT Helpdesk
Contact
  • 250 Mill Street Suite PW2325, Taylors, SC 29687
  • 864 551 2061
  • info@eitnetworks.net
Newsletter
Sign up for our latest news & articles. We won’t give you spam mails.
© copyright 2021 by EIT Networks, LLC