The tricks of these gangs are to infiltrate the remote victim computer (via spam, malicious links), then send fake network security notice, asking the victim to pay a sum of money. fine (from 50-200 USD) for using pirated software if you don't want to lose all data in your computer.
According to Synmantec, ransom malware has "evolved" over three periods. This type of software originated from Russia, was first discovered in 2006. This period ransom malware can only encrypt and isolate the victim's files. By 2009, the ransom malware had an additional lock screen, requiring ransom to a designated account to be 'unlocked' the computer.
In 2011, the ransom malware was added to the direct payment feature. Ransom malware's main tricks during this period were to forge a police force to scare and profit from victims.
In addition to the nightmare of ransom malware, hackers also use software to impersonate large technology firms to gain illicit profits. The trick is still to entice the victim to provide credit account information.
Phishing software often clones according to the identification signs of reputable technology firms
In April this year, the Microsoft Company in Australia acknowledged the inability to try to quell the phone scam from India. These scammers used an impersonation software called Microsoft Event Viewer (or 'eventvwr' for short ). After being installed on the victim machine, the software currently notifies users to download another software to fix the operating system error. Fixing errors will cost you and ask the victim to provide credit account information.
According to Gartner, the US-based market research firm, the biggest security threat in 2013 will be threats from the Internet environment. Hackers know how to target those who lack the knowledge of security to exploit important information and data.
Data kidnapping software (also known as Ransom malware) is a type of software that is automatically downloaded after the victim's computer is infected with a special malicious code. Ransom malware often encrypts users' data, making them unable to read the data or lock the victim's computer, along with a "ransom" message.