{"id":13044,"date":"2018-06-11T10:21:27","date_gmt":"2018-06-11T08:21:27","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=13044"},"modified":"2018-07-31T12:31:26","modified_gmt":"2018-07-31T10:31:26","slug":"new-variant-of-bip-dharma-ransomware-found","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2018\/06\/new-variant-of-bip-dharma-ransomware-found\/","title":{"rendered":"[:en]New variant of BIP Dharma ransomware found[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p><strong>WHAT IS RANSOMWARE?<\/strong><\/p>\n<p>Ransomware, for example, CryptoLocker, WannaCry or <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/new-bip-dharma-ransomware-variant-released\/#.Wx4aKd0pSsY.twitter\">BIP Dharma<\/a>,\u00a0is a type of malware that installs itself on a device, takes files on the device or network storage, encrypts them, and then extorts money from the user to unlock the files.\u00a0\u00a0This type of programme can be installed by means of an e-mail attachment, an infected programme or unsafe website with <em>malware<\/em> installed on it.\u00a0<\/p>\n<p>The software &#8220;kidnaps&#8221; your data by encrypting or limiting your access to it and then sending you a message demanding money to regain your access. The only way access is possible again is by acquiring an encryption key from the creator of the <em>ransomware<\/em>\u00a0at a fee. However, paying this fee doesn&#8217;t guarantee that you will have access to your data again, so doing this is a huge risk.<\/p>\n<p>According to Sophos security ransomware is one of the most widespread and damaging threats that internet users face today.\u00a0<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.sun.ac.za\/it\/files\/2018\/06\/photo-1514108225820-2b602873ac36-300x169.jpg\" alt=\"\" width=\"300\" height=\"169\" align=\"right\" \/><\/strong><\/p>\n<p><strong>HOW TO AVOID BECOMING A RANSOMWARE VICTIM\u00a0<\/strong><\/p>\n<p>You can practice the following security practices to avoid falling victim to ransomware.<\/p>\n<p><strong>1. Make backups<\/strong><\/p>\n<p>Ensure that you always have the latest backup of your work somewhere else, preferably off-site. If you do fall for a ransomware attack, you will still have your data. Having your data off-site also protects it from events such as a fire, flood or theft or damage to your device. Additionally, you can encrypt your device to ensure that if it ends up in the wrong hands, they won&#8217;t be able to access it.\u00a0<\/p>\n<p><strong>2.\u00a0Do not open attachments<\/strong><\/p>\n<p>If you receive an attachment from someone you don&#8217;t know. And even if you do know the person, first confirm whether they did send it to you. Just because it&#8217;s from someone you know, it doesn&#8217;t mean it&#8217;s safe. Your colleague or friend&#8217;s account could have been hacked.\u00a0<\/p>\n<p><strong>3. Scan attachments<\/strong><\/p>\n<p>There are tools such as VirusTotal available for scanning attachments to ensure that they are safe to open. VirusTotal is an online scanning tool and can be found at\u00a0https:\/\/www.virustotal.com\/#\/home\/upload.<\/p>\n<p><strong>4.<\/strong> <strong>Keep Windows updated<\/strong><\/p>\n<p>Make sure all Windows updates are installed as soon as they come out. Also make sure you update all programmes, especially Java, Flash, and Adobe Reader. Older programs contain security vulnerabilities that are commonly exploited by malware distributors. Therefore it is important to keep them updated.<\/p>\n<p><strong>5. Security software<\/strong><\/p>\n<p>Make sure you\u00a0have some sort of security software installed. If you are unsure whether you have adequate protection on your device, contact us to assess your security.<\/p>\n<p><strong>6. Difficult password<\/strong><\/p>\n<p>Use hard passwords and never reuse the same password at multiple sites.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: right;\">[SOURCE:\u00a0<a href=\"https:\/\/community.sophos.com\/kb\/en-us\/120797\">www.sophos.com]<\/a><\/p>\n<p>&nbsp;<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] WHAT IS RANSOMWARE? Ransomware, for example, CryptoLocker, WannaCry or BIP Dharma,\u00a0is a type of malware that installs itself on a device, takes files on the device or network storage, encrypts them, and then extorts money from the user to unlock the files.\u00a0\u00a0This type of programme can be installed by means of an e-mail attachment, [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[],"class_list":["post-13044","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2"],"publishpress_future_action":{"enabled":false,"date":"2026-05-22 06:38:35","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=13044"}],"version-history":[{"count":11,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13044\/revisions"}],"predecessor-version":[{"id":13056,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13044\/revisions\/13056"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=13044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=13044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=13044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}