The Lighter Side Of The Cloud – Apple Pay
The Lighter Side Of The Cloud: Disaster Recovery Plan
The Lighter Side Of The Cloud – Company Strategy
Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware And Backup On The Cloud

Ransomware is a kind of malware that withholds some digital assets (mostly user’s data) from its victims and asks for payment for their release. Ransomware could be the best reason yet to use cloud data storage systems. Over the past several weeks, many Windows users were infected by CryptoLocker malware that encrypts your files until you pay a ransom. US-CERT has reported that the primary means of infection are phishing emails containing malicious attachments, but the aforementioned malware can also be deployed by malicious web sites by exploiting outdated browser plugins.

security-cloud

The CryptoLocker

Removing the CryptoLocker is not complex, but the real problem is that all your important files will remain encrypted and useless until you pay the ransom. Furthermore, some victims have claimed that they paid and did not receive the promised decryption key. CryptoLocker has the ability to find and encrypt files located within shared network drives, USB drives, external hard drives, and network file shares. The ransomware then connects to attackers’ server where it deposits the private encryption key. Files are encrypted using strong asymmetric encryption. The Cryptolocker asks you to pay $300 ransom by using MoneyPak or Bitcoins in 3-4 days to get your computer’s functionality back. If you don’t pay, it will delete your encryption key and you will not have any way to decrypt your files. Users can get their file back only by restoring from external backup or shadow copy, so using cloud storage to backup your important data can prevent damage from the Cryptolocker and similar ransomware threats. In addition, the attackers have recently launched a Russia based hosting web site that allows victims to purchase the key for their infected encrypted files. Most antivirus companies have released updates for their users to detect Cryptolocker and remove registry keys which are required to show the screen for paying the ransom. So, the attackers have launched the decryption web site to be eventually paid for encryption key of infected user’s files.

Prevention

To protect computers and local networks from ransomware infections you can take common preventative measures:

  •  do not follow web links or submit any information in suspicious e-mail messages and safely handle e-mail attachments
  • use up-to-date anti-malware software
  •  perform regular backups of all critical data on dislocated servers or use cloud data storage offers
  •  patch regularly your operating system and applications
  •  use IDS and firewalls to detect malicious activities
  •  use authorization for shared drives

Backup on the cloud

Key benefits of cloud backup are lower costs, risk mitigation to the service provider, flexibility and agility, improved data protection, and ease of use. Through cloud backups, small businesses can build recover solutions without investing in hardware and software licensing. They can easily store their data in remote servers with included vendor’s additional redundancy and protect themselves from ransomware and similar threats.

By Darko Androcec

Darko Androcec

Darko is a research and teaching assistant and a PhD candidate at the University of Zagreb. Before joining faculty, he was a computer security incident handler and a Java developer of banking information systems. 

Latest posts by Darko Androcec (see all)

Sorry, comments are closed for this post.

Backup

Recent

Surprising Facts and Stats About Your Online Security

Surprising Facts and Stats About Your Online Security

Surprising Facts and Stats – Online Security It’s easy to get lulled into a false sense of security when browsing the web. As more and more devices join the internet of things, the risk of becoming a victim of a criminal cyber gang is increasing – we have more unsecured access points and offer would-be…

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting

World Backup Day: Understand The Data You Are Protecting Did you know that 113 phones are lost or stolen every minute? What about the fact that 1 in 10 computers are infected with a virus every month? Thanks to World Backup Day, an independent initiative that was started in 2011, awareness is being raised about…

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market – Cloud Computing Adoption

The E-Learning Market  We’ve talked a fair bit about e-Learning and MOOCs (Massive Open Online Courses) technologies here on CloudTweaks over the past number of years. The industry is expected to continue to grow at a brisk pace as more and more firms and educational institutions start to adopt cloud based services.  Docebo has an excellent…

Popular

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Infographic: Cloud Public, Private & Hybrid Differences

Cloud Public, Private & Hybrid Differences Many people have heard of cloud computing. There is however a tremendous number of people who still cannot differentiate between Public, Private & Hybrid cloud offerings.  Here is an excellent infographic provided by the group at iWeb which goes into greater detail on this subject. Infographic source: iWeb About…

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker – why is it such a heated debate?

PaaS vs Docker Docker started as just a software container on top of a Linux operating system which seemed like a simple optimization for a fat hypervisor. Its disruptive force however comes from the fact that it does force us to rethink many of the layers of the cloud stack. Starting from the way we…

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world. Under the Eyes of a Deity Deep beneath the famous Uspenski Cathedral in the…

The Cloud Above Our Home

The Cloud Above Our Home

Our Home – Moving All Things Into The Cloud The promise of a smart home had excited the imagination of the movie makers long ago. If you have seen any TV shows in the nineties or before, the interpretation presented itself to us as a computerized personal assistant or a robot housekeeper. It was smart,…

Five Cloud Questions Every CIO Needs To Know How To Answer

Five Cloud Questions Every CIO Needs To Know How To Answer

The Hot Seat Five cloud questions every CIO needs to know how to answer The cloud is a powerful thing, but here in the CloudTweaks community, we already know that. The challenge we have is validating the value it brings to today’s enterprise. Below, let’s review five questions we need to be ready to address…

Sponsored Posts

Moving From Email Into The Cloud

Moving From Email Into The Cloud

Mobile Collaboration In The Cloud Imagine that you, as a manager, are told by the powers that be that you have to find “efficiencies” within your department that will result in one million dollars of savings annually. You struggle with this. You send an email to everyone on your senior team. “Where can we save…

Cloud Logo Sponsors

hp Logo CityCloud-PoweredByOpenstack-Bluesquare_logo_100x100-01
cisco_logo_100x100 vmware citrix100
Site 24x7


Contributor Spotlight

Established in 2009, CloudTweaks is recognized as one of the leading influencers in cloud computing, big data and internet of things (IoT) information. Our goal is to continue to build our growing information portal, by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Branded Content Programs

Advertising