{"id":12099,"date":"2017-06-02T13:56:31","date_gmt":"2017-06-02T11:56:31","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=12099"},"modified":"2017-06-06T12:13:50","modified_gmt":"2017-06-06T10:13:50","slug":"avoiding-ransomware-attacks","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2017\/06\/avoiding-ransomware-attacks\/","title":{"rendered":"[:en]How to avoid ransomware attacks[:af]Hoe om ransomware te vermy[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Ransomware is a type of malware designed to encrypt users\u2019 files or lock their operating systems so attackers can demand a ransom payment. According to a <a href=\"http:\/\/www.symantec.com\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener noreferrer\">2016 Symantec report<\/a>, the average ransom demand is almost $700 and \u201cconsumers are the most likely victims of ransomware, accounting for 57 percent of all infections between January 2015 and April 2016.\u201d<\/p>\n<p>Similar to a phishing attack, ransomware executes when a user is lured to click on an infected link or e-mail attachment or to download a file or software drive while visiting a rogue website. Sophisticated social engineering techniques are used to entice users to take the desired action; examples include<\/p>\n<ul>\n<li style=\"text-align: left;\">an embedded malicious link in an e-mail offers a cheap airfare ticket (see figure 1);<\/li>\n<li style=\"text-align: left;\">an e-mail that appears to be from Google Chrome or Facebook invites recipients to click on an image to update their web browser (see figure 2); or<\/li>\n<li style=\"text-align: left;\">a well-crafted website mimics a legitimate website and prompts users to download a file or install an update that locks their PC or laptop.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-large wp-image-12104\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-500x414.png\" alt=\"\" width=\"500\" height=\"414\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-500x414.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-300x249.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1.png 706w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>Figure 1. Phishing e-mail with ransomware embedded in a link<\/strong><\/p>\n<figure class=\"figure-panel\"><figcaption>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-large wp-image-12105\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-500x345.png\" alt=\"\" width=\"500\" height=\"345\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-500x345.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-300x207.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2.png 706w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<\/figcaption><\/figure>\n<figure class=\"figure-panel\"><figcaption>\n<p><strong>Figure 2. A fake Google Chrome e-mail<\/strong><\/p>\n<\/figcaption><\/figure>\n<p>To avoid becoming a victim of ransomware, users can follow these tips:<\/p>\n<ul>\n<li><strong>Delete any suspicious e-mail.<\/strong> Messages from unverified sources or from known sources that offer deals that sound too good to be true are most likely malicious (see figure 3). If in doubt, contact the alleged source by phone or by using a known, public e-mail address to verify the message\u2019s authenticity.<\/li>\n<li><strong>Avoid clicking on unverified e-mail links or attachments.<\/strong> Suspicious links might carry ransomware (such as the <a href=\"http:\/\/en.wikipedia.org\/wiki\/CryptoLocker\">CryptoLocker<\/a> Trojan).<\/li>\n<li><strong>Use e-mail filtering options whenever possible.<\/strong> E-mail or spam filtering can stop a malicious message from reaching your inbox.<\/li>\n<li><strong>Install and maintain up-to-date antivirus software.<\/strong> Keeping your operating system updated with the latest virus definitions will ensure that your security software can detect the latest malware variations.<\/li>\n<li><strong>Update all devices, software, and plug-ins on a regular basis.<\/strong> Check for an operating system, software, and plug-in updates often \u2014 or, if possible, set up automatic updates \u2014 to minimise the likelihood of someone holding your computer or files for ransom.<\/li>\n<li><strong>Back up your files.<\/strong> Backup the files on your computer, laptop, or mobile devices frequently so you don\u2019t have to pay the ransom to access locked files.<\/li>\n<\/ul>\n<figure class=\"figure-panel l-pull-left\"><img decoding=\"async\" src=\"http:\/\/er.educause.edu\/~\/media\/images\/blogs\/2016\/11\/erob166211figure3.png?la=en\" alt=\"Figure 3. An example ransomware e-mail message\" \/><figcaption>\n<p><strong>Figure 3. An example ransomware e-mail message<\/strong><\/p>\n<\/figcaption><\/figure>\n<div>\u00a0<\/div>\n<p>[:af]<\/p>\n<p>Ransomware is `n tipe malware ontwerp om gebruikers se\u00a0l\u00eaers te enkripteer\u00a0of hulle\u00a0bedryfstelsels\u00a0te blok sodat\u00a0kuberkrakers\u00a0`n losprys\u00a0kan eis. \u00a0Volgens `n\u00a0<a href=\"http:\/\/www.symantec.com\/security-center\/threat-report\" target=\"_blank\" rel=\"noopener noreferrer\">2016 Symantec-verslag<\/a>, is die gemiddelde\u00a0losprysbedrag\u00a0$700 en is 57% van alle sekuriteitsinsidente onder gebruikers tussen January 2015 en April 2016 <em>ransomware.<\/em><\/p>\n<p>Soortgelyk aan `n\u00a0<em>phishing<\/em>-aanval, lok ransomware ook gebruikers om op `n\u00a0kwaadwillige skakel te kliek,\u00a0of `n\u00a0epos aanhangsel oop te maak\u00a0of om\u00a0sagteware\u00a0af te laai\u00a0vanaf\u00a0`n\u00a0bedrieglike\u00a0webwerf. Gesofistikeerde sosiale ingenieurswese\u00a0metodes word gebruik om gebruikers\u00a0in die versoeking te bring om te reageer, byvoorbeeld<\/p>\n<p>Sophisticated social engineering techniques are used to entice users to take the desired action; examples include<\/p>\n<ul>\n<li style=\"text-align: left;\">`n\u00a0ingesluite\u00a0kwaadwillige\u00a0skakel\u00a0in `n e-pos belowe\u00a0`n goedkoop\u00a0vliegtuigkaartjie (siene figuur 1);<\/li>\n<li style=\"text-align: left;\">`n e-pos wat lyk\u00a0asof dit van Google Chrome of Facebook kom nooi ontvangers om op grafika te kliek om hulle webblaaier op te dateer (sien figuur 2); of<\/li>\n<li style=\"text-align: left;\">`n goedgeprakseerde webwerf na-aap `n werklike webwerf en por gebruiker aan om `n l\u00eaer af te laai of `n opdatering te installeer wat dan hulle toestel sluit.\u00a0<\/li>\n<\/ul>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-large wp-image-12104\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-500x414.png\" alt=\"\" width=\"500\" height=\"414\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-500x414.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1-300x249.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware1.png 706w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p><strong>Figure 1. <em>Phishing<\/em> e-pos met ransomware versteek in `n skakel<\/strong><\/p>\n<figure class=\"figure-panel\"><figcaption>\n<p><a href=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-large wp-image-12105\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-500x345.png\" alt=\"\" width=\"500\" height=\"345\" srcset=\"https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-500x345.png 500w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2-300x207.png 300w, https:\/\/blogs.sun.ac.za\/it\/files\/2017\/06\/ransomware2.png 706w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<\/figcaption><\/figure>\n<figure class=\"figure-panel\"><figcaption>\n<p><strong>Figure 2. `n Vals Google Chrome e-pos<\/strong><\/p>\n<\/figcaption><\/figure>\n<p>Om te voorkom dat jy die slagoffer word van ransomware, volg die hierdie wenke:<\/p>\n<ul>\n<li><strong>Vee enige\u00a0verdagte\u00a0e-posse.<\/strong>\u00a0Boodskappe gestuur vanaf\u00a0ongeverifieerde\u00a0bronne\u00a0wat aanbiedinge bied wat te goed klink om waar te wees, is waarskynlik gevaarlik. (sien figuur 3) As jy twyfel, kontak die beweerde bron telefonies of d.m.v. hulle amptelike adres om die boodskap se geloofwaardigheid te bevestig.<\/li>\n<\/ul>\n<ul style=\"list-style-type: circle;\">\n<li><strong>Moenie op ongeverifieerde\u00a0e-posskakels\u00a0of aanhangsels kliek nie.\u00a0<\/strong>\u00a0Verdagte skakels\u00a0kan ransomware (soos die <a href=\"http:\/\/en.wikipedia.org\/wiki\/CryptoLocker\">CryptoLocker<\/a> Trojan bevat).<\/li>\n<\/ul>\n<ul>\n<li><strong>Gebruik e-pos filtermetodes wanneer moontlik.<\/strong> E-pos of gemorsposfilters\u00a0kan keer dat\u00a0gevaarlike\u00a0boodskappe in jou\u00a0posbus beland.<\/li>\n<li><strong>Installeer en onderhou jou\u00a0antivirus-sagteware.<\/strong>\u00a0 Hou jou bedryfstelsel op datum met die nuutste\u00a0virusdefinisies. Dit sal verseker\u00a0dat\u00a0 jou sekuriteitsagteware\u00a0die nuutste malware-weergawes\u00a0kan optel.<\/li>\n<li><strong>Dateer jou\u00a0toestelle, sagteware en\u00a0inprop-programme (plug-ins) gereeld op.<\/strong>\u00a0Kyk gereeld vir\u00a0nuwe weergawes\u00a0of opdaterings van jou bedryfstelsel, sagteware en inprop-programme \u2014 of, indien moontlik, stel dat dit outomaties opdateer. Dit sal die kans dat jou rekenaar en data gyselaar gehou word verminder.\u00a0<\/li>\n<li><strong>Rugsteun jou l\u00eaers.<\/strong>\u00a0Rugsteun die l\u00eaers op jou\u00a0PC, skootrekenaar en toestelle dikwels sodat jy nie\u00a0hoef te betaal as jou\u00a0data nie toeganklik is as gevolg van <em>ransomwar<\/em>e nie.\u00a0<\/li>\n<\/ul>\n<figure class=\"figure-panel l-pull-left\"><img decoding=\"async\" src=\"http:\/\/er.educause.edu\/~\/media\/images\/blogs\/2016\/11\/erob166211figure3.png?la=en\" alt=\"Figure 3. An example ransomware e-mail message\" \/><figcaption>\n<p><strong>Figuur 3. `n Voorbeeld van `n ransomware e-posboodskap<\/strong><\/p>\n<\/figcaption><\/figure>\n<div>\u00a0<\/div>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Ransomware is a type of malware designed to encrypt users\u2019 files or lock their operating systems so attackers can demand a ransom payment. According to a 2016 Symantec report, the average ransom demand is almost $700 and \u201cconsumers are the most likely victims of ransomware, accounting for 57 percent of all infections between January [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[54480,20381,29207],"class_list":["post-12099","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-cryptolocker","tag-phishing","tag-ransomware"],"publishpress_future_action":{"enabled":false,"date":"2026-05-08 07:09:51","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12099","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=12099"}],"version-history":[{"count":9,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12099\/revisions"}],"predecessor-version":[{"id":12178,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/12099\/revisions\/12178"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=12099"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=12099"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=12099"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}