hi everyone
i have got a task  to do complete study on ransomeware , can any one help me geeting complete details like
1. what exactly is ransomeware
2. how it is attached
3. how to prevent
4. what exactly it does
5. how effective it is
6. what are the different ways it will attack
vivek chintalaAsked:
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Nitin SontakkeDeveloperCommented:
That's a very broad question to answer.

However, on this page itself, i am seeing an promotion ad, the hyperlink of which I am posting here.

As you may or may not see exact same ad.
vivek chintalaAuthor Commented:
thanks for reply.
can i get some links or material on this
btanExec ConsultantCommented:
I wrote an article on the faq for this. Should address those queries.

Long short of it is lethal as it can come from web surfing, phished emails, USB drives, file sharing, compromised website etc. The measures are only from data backup and use clean machine. Cyber hygiene is paramount as these are the loop holes that attacker exploit on.


Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
HTML5 and CSS3 Fundamentals

Build a website from the ground up by first learning the fundamentals of HTML5 and CSS3, the two popular programming languages used to present content online. HTML deals with fonts, colors, graphics, and hyperlinks, while CSS describes how HTML elements are to be displayed.

vivek chintalaAuthor Commented:
thanks a lot for your information. i had one question
i have configured my company mail outlook in my mobile . my mobile is connected with gprs publick network . now with the help my mail account in my mobile is there any chance to attach comapny mail server ?
AntzsInfrastructure ServicesCommented:
You can enroll for a free course entitled "Ransomware: The problem and Some Solutions"

Click on Courses from the Browse drop down.
btanExec ConsultantCommented:
i have configured my company mail outlook in my mobile . my mobile is connected with gprs publick network . now with the help my mail account in my mobile is there any chance to attach comapny mail server ?
is this something to do with your original query?  typically for getting company email securely  VPN should be set up with an agent installed in your mobile device . otherwise  can setup POP or IMAP account as long as the exchange server is accessible in public
vivek chintalaAuthor Commented:
does ransomeware spread across network ?
btanExec ConsultantCommented:
yes, it can do RDP bruteforce and spread, see my article #7
does ransomeware spread across network ?
If the context of your question is whether it spreads from an infected victim, the answer is sometimes, but not always. Methods vary, but include malicious attachments via email as well as brute force via RDP.
btanExec ConsultantCommented:
Infection spread to other computers running Remote Desktop or Terminal Services exploiting user accounts with weak passwords (one instance is CrySiS)

Infection through the encrypted files that is sync or shared across cloud apps and collaborative apps' storages. The files are embedded with actual malicious codes and becomes a viral file (one instance is Virlock, and its variants i.e. VirRansom, VirLocker)

Infection spread via removable storage drives such as USB thumbdrives (observed in ZCryptor Ransomware).

Infestation of other malware including backdoor that allow criminal to remotely control  and take over machine.

Infected machine planted with DDoS bot (e.g. bundled with Cerber Ransomware variant) to launch attack against other systems.

Infection spread wildly (Samas instance) by infecting one computer, scavenge for more machines, and continue infecting more possibly interconnected machines.  It does all this by stealing domain credentials, identify targets and then move laterally.
Rajul RajInformation Security OfficerCommented:
btanExec ConsultantCommented:
Advice given
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today

From novice to tech pro — start learning today.