Making complex data simple and compelling
From digital device to digital evidence
Unlock your vehicle's digital evidence potential
Forensic Analysis and Enhancement
Investigating and analyzing financial records
Gain access to the online accounts of deceased loved ones
Clear, precise evidence for a messy world
Expert reports to suit your specific needs
We can locate people anywhere
Stop worrying and learn the truth
Prevent, Detect, Respond To Cyberattacks
First response is crucial. Every minute counts.
The first response is critical to reduce liability
Detection & Removing Spyware Services
Reduce your electronic risk from digital transmittals
Stop criminals in their tracks
Don’t let criminals destroy your life
Find out who you are really talking to
Experienced, Confidential Services
Swift, professional incident response
Complicated cases require compelling digital facts
Find, recover and document digital evidence
Bring solid evidence before a judge
Cases can be investigated using Social Media
Divorce, custody battles, and other
Win the most important battle of your life
Everything you need
Effective Expert Witness in Court
Evidence shows who is telling the truth
Subpoena power yields strong evidence
Digital evidence can build a strong defense
A huge number of new viruses appear every year in the world, some of which cause notable harm not only to ordinary people, but also to large firms. About 90 million new viruses were created in the world in 2017, and about 300,000 are created daily.
Antiviruses are getting better and better every year, but this does not mean 100 percent guaranteed protection for users of personal computers and smartphones from various viruses. The virus creators do not sleep.
In this article we will get acquainted with the TOP 5 malware of 2017, and we will look at means of protection.
Perhaps the most extensive malicious program created in the last year was the worm virus WannaCry. This virus encrypts all information on the computer, and money is demanded for decryption. After three days of inaction on the part of the victim, the required amount of money increases. A week later, the files become encrypted forever. In total, this virus has harmed about 500,000 computers in 74 countries, and it took him only two hours to distribute.
Bad Rabbit is a cryptographic virus. A malicious program infects a computer by encrypting files on it. The virus suggests making a payment on the specified site in a darknet (this requires a Tor browser) to access the files. For the unlocking of each computer, victims are required to pay 0.05 bitokoya, that is, about 16,000 rubles or $280. After 48 hours, the amount increases.
According to experts from several companies that have been attacked by the “rabbit,” it is a modified version of the NotPetya virus. The source code of these two programs, as a result of the check, coincided by 13 percent. NotPetya, incidentally, also was established in 2017 and attacked computers in 65 countries.
The Petya virus is also known by other names: Petya.A, PetrWrap, NotPetya, ExPetr. When it hits the computer, it downloads an encryptor from the internet and tries to hit part of the hard disk with the data necessary to boot the computer. If it succeeds, the system issues a “blue screen of death.” After the reboot, a hard drive check message appears asking you not to turn off the power. Thus, the virus-encryptor poses itself as a system program for checking the disk, while encrypting files with certain extensions. At the end of the process, you receive a message about the computer locking and information on how to get the digital key for decrypting the data. The Petya virus requires ransom, as a rule, in bitcoins.
Both viruses differ in that they do not destroy information on the computer, but only encrypt it.
Among the new viruses of 2017, you can also note Black Hat Europe. This virus can hit any version of Windows, while remaining invisible to antivirus because its code is in RAM, leaving no traces on the hard drive.
Malware analysts detected a virus called Slingshot, which proved to be capable of infecting routers with multi-level attacks. The new program is aimed at routers. Thus, information that is dangerous for the system spreads faster and spreads immediately to several devices. The virus replaces the library with a specially crafted copy, loads the infected components and then launches the attack process. The program is able to steal any information stored in digital form, including network traffic, screenshots and passwords. It also carefully monitors its own security and smooth operation: for example, to distract any suspicions from itself, the virus initiates computer security checks on its own.
What can you do to protect yourself?
Unfortunately, it is impossible to provide complete protection from viruses. For that, it is necessary that new viruses cease to appear, and that is a naive hope. There are some things you can do, however.
One of the main ways to combat viruses is timely prevention. Some recommendations should be followed to prevent infection by viruses:
Antivirus protection software
There is quite a lot of antivirus protection software available. Modern antivirus programs consist of modules:
Is it possible to decrypt such files without resorting to criminals? Yes, it is. This is due to programming errors, which lead to the fact that:
In addition, it is possible that when recovering deleted files (which were not encrypted), important files will be restored.
As the practice of Digital Forensics Corp. shows, a large number of ransomware attacks are associated with attempts by hackers to remove forensics artifacts from a compromised computer. Therefore, before the files on the computer are encrypted, hackers steal financial information or private data from a compromised computer and only after that launch a piece of ransomware. Forensics analysts at Digital Forensics Corp. can determine what files and data have been stolen from a compromised computer. Our analysts strongly recommend conducting studies of compromised computers so that their owners know for sure whether their private data has been stolen or not.
Save my name, email, and website in this browser for the next time I comment.
Speak to a Specialist Now