928-649-8324

Ransomware (New Malware) continues to be a scourge in 2022.

Many people are still spending an elevated amount of time online at home. This has made 2022 a bad year so far for computer viruses and new malware.

Here’s a roques’ gallery of the New Malware infections we’re seeing:

  • Shlayer: downloads and launches other malware.
  • CoinMiner: doesn’t steal crypto coins, steals the victim’s computer resources and electricity to mine its own coins for its owners.
  • RedLine: steals crypto coins, passwords, and banking login information.
  • ZeuS: a modular (i.e. well-engineered and so new variants and improvements keep coming out) banking trojan.
  • Nanocore: attackers can log in to the victim’s computer remotely, and then do as they please.
  • AgentTesla: attackers can log in to the victim’s computer remotely, and then do as they please, in this case including log keystrokes and capture screenshots from the infected computer.
  • Gh0st: another remote login attack.
  • Cerber: ransomware, there are currently at least 6 primary variants of Cerber all with advanced detection evasion capabilities.

These threats are delivered in the following ways:

  • Dropped – delivered by other infections that have evaded anti-virus.
  • Spam – unsolicited emails which trick users into downloading or opening viruses.
  • Pop-ups: introduced through malicious pop-up advertisements.

What is Ransomware and how can you get it?

Ransomware works on a simple principle. The attacker will find a way to steal your data and demand payment. The most popular type of ransomware is encryption ransomware. This removes your ability to access your documents because it encrypts them. They tell you that you will receive the key to decrypt the documents if you pay the ransom.

Another ransomware is out there that blocks all access to your computer or mobile device. Screen locker ransomware is less dangerous than encrypting ransomware, but it’s easier to defeat. The most dangerous malware is the one that encrypts all of your hard drives, making it unusable. This last type of malware is rare.

Ransomware attacks can be very subtle and you may not even notice them immediately. It doesn’t give you the usual warning signs that malware is present. The ransomware encryption does its work silently in the background. Its purpose is to finish its wicked purpose before you can know what is going on. After the job is done, the ransomware will display instructions on how to pay the ransom or get your files back. The perpetrators will demand untraceable payments, and Bitcoin is a popular option. Ransomware might also ask victims to buy a gift card, prepaid debit card, and provide the card number.

This infection is often transmitted via infected Office documents or PDFs that are sent to you by email that appears legitimate. You may think it is coming from your company’s address. This is what happened in the WannaCry ransomware attacks a few years back. Do not click the link if you are unsure about the legitimacy of the email.

Ransomware is a type of malware that can be delivered to your computer using any method. For example, a drive-by download that is hosted on a malicious advertisement at a site otherwise safe. This could be done by inserting an infected USB drive on your computer, but this is much less common. If you are lucky, your malware protection software will detect it right away. You could end up in serious trouble if it doesn’t.

Ransomware attacks can turn your files into encrypted gibberish. Often, you only have one option: pay to get them back. Ransomware protection is available to prevent these attacks from happening. You can report ransomware attacks here.

If your computer contracts one of these New Malware programs, be sure to contact our office right away. We are trained in removing and helping you to recover from these Malware infections.