Saturday, March 5, 2016

Blackmailer software spreads rapidly – Nordbayern.de

for topic

LKA advises to regularly back up data, such as an external hard drive – 1 hour

‘);
 }
 
   

‘); }
Currently warn IT security experts alleged emails from the Federal, in turn, before & quot; Locky. & quot; warn

          Currently warn IT security experts alleged emails from the Federal, warn again against “Locky”.
   
   © dpa
   

   

       


   

Since January 2015 620 cases were registered. Derlei attacks on computers are not new, but the quality has changed. In the past, viruses have a system locked, today the data would be encrypted.

The ransomware (ransom software) will usually by clicking on the fake e-mail attachments on their way to a computer system. If the Trojan active by opening the attachment, encrypt all files on the affected computer. The blackmailer ransom for decryption.

Even after the payment of a ransom, the data would not necessarily decrypted, said the LKA expert on cybercrime. Experts could reconstruct data but under certain circumstances. Victims of Trojans should never pay, but charges. Although it is difficult to grasp the backers. “But there is reason to hope that we catch them.”



number of attacks is increasing rapidly

The number of attacks with blackmail malicious software “increases rapidly” and the distances between the spread new trojan variants would ever shorter, the spokesman said. By contrast, there are rare cases with the previous malware. Blocking of the computer have can be eliminated more easily than an encryption

.

The LKA spokesman advised to regularly back up data, such as an external hard drive. It is important that the backups are not permanently connected to the computer, as they might otherwise be also affected. Recently the Fraunhofer Institute in Bayreuth and the city administration had been victims of a crypto-Trojan in Lower Franconia Dettelbach among others.

Currently warn IT security experts alleged emails from the Federal, in turn, warn of “Locky” , In the Mail claims that the BKA working with manufacturers of antivirus software. Recipient of the mail should download a security advisor and an analysis tool in the Annex. This file is itself but a trojan.

dpa

LikeTweet

No comments:

Post a Comment