... | ... | @@ -27,10 +27,8 @@ Many Ransomware attacks that mean business will destory automactic backups, repa |
|
|
The nail in the coffin of a ransomware attack. The Ransomware goes through the computer encrypting all the files it wants. This could be just images of your puppies to basically the entier computer. Whatever they deem necessary to get the victim to pay.
|
|
|
|
|
|
The method of encryption is usually RSA of some form. RSA is simple enough to do, and cannot be brute forced as of now. Which means your files are mathematically in alcatraz.
|
|
|
### Image Here
|
|
|
## Demand Money for the encryption key
|
|
|
Last, but not least, is the extortion.
|
|
|
### Image Here
|
|
|
Just about all Ransomware attacks demand money in exchange for the encryption key. Due to crypto currencies, like Bitcoin, these payoff are anonymous so the hackers are not traceable. After recieveing their money, the victim may or maynot get the encryption key, if it's a low level attacker, but they high level attackers will give they key to keep their reputation up. Otherwise, no one would pay.
|
|
|
|
|
|
# Robbinhood As an Example
|
... | ... | |