男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影

Beware - 'kidnappers' from cyberspace

Updated: 2016-04-15 06:36

By Luo Weiteng in Hong Kong(HK Edition)

  Print Mail Large Medium  Small

 Beware - 'kidnappers' from cyberspace

Ransomware culprits have turned to blackmailing victims with the data they have hacked into. The nasty business has surged since it first appeared in Russia and Eastern Europe. Edmond Tang / China Daily

A window pops up on the computer screen warning: "Your personal files are encrypted by CTB-Locker" - some 10 minutes after Betty Xu clicked a suspicious attachment called "Terms and Conditions" in an English-language email sent from "Bothman".

With the popped-up window failing to be closed and the countdown having started right away, the Beijing-based marketing director assistant was then told to pay 3 bitcoins (about $1,300) within 96 hours to have her files unlocked.

"At the very outset, I thought it was just an advertising scam," says Xu. "Having seen all the files on my computer failing to open, I then realized it was the malicious attachment I had unwittingly clicked that had made me a victim of a cybercrime wave racing across the globe."

It's ransomware - a nasty business whereby criminals can lock up or encrypt a person's computer's data, forcing the user to pay a "ransom" or lose his or her files forever.

Beware - 'kidnappers' from cyberspace

As the name suggests, a "ransom" is involved, mostly paid with the bitcoin - a digital currency of an anonymous nature that makes it very difficult for those involved to be traced.

Last year, the US Federal Bureau of Investigation (FBI) dealt with 2,453 complaints about ransomware holdups, costing victims more than $24 million.

In Hong Kong, which ranks 6th in the region and 39th globally in terms of ransomware, up to 21 attacks are reported daily, according to the 2016 Internet Security Threat Report released by US tech firm Symantec on Thursday.

Some 41 ransomware attacks have been reported to the Hong Kong Computer Emergency Response Team Coordination Centre (HKCERT) since mid-February, with 38 hacking cases reportedly confirmed as infection by a new strain of ransomware - Locky.

A cheery-sounding name as it may be, the new variant has been on an aggressive hunt for victims since it first appeared in mid-February.

Between March 16 and 18 this year, HKCERT had noted a sudden surge in the number of Locky-related cases to 15. The number of attacks reported on a single day rose from 3 to 6.

Among local schools, more than 10 ransomware attacks have been reported in the past two months, said Albert Wong, chairman of Hong Kong's Association of IT Leaders in Education.

Leung Siu-cheong, a senior consultant with HKCERT, believes it's only the tip of the iceberg, and the problem should be much more serious as many of the cases go unreported.

Many of the victims, especially institutions, he points out, still tend to keep the problem out of view, largely because they don't want their clients or the public to think they're incapable of protecting their computer systems, client records and public interest.

Since ransomware first surfaced in Russia and Eastern Europe in 2009, dozens of software companies have advertised solutions for ransomware, but only a few have claimed success, says Leung.

Even the FBI has been quoted as saying: "The ransomware is that good. The easiest thing may be to just pay the ransom. And, an overwhelming majority of institutions just pay up."

Beware - 'kidnappers' from cyberspace

This is also what Xu was told by cyber-security experts, who believe that her only option was to pay the "ransom" to free up her data.

Dismissing the idea of caving in to hackers' demands, Xu did manage to redo some of her files with the help of colleagues. For the rest, she still has to work overtime to restore them.

However, unlike Xu, many institutions may not be able to afford remaking an enormous load of files and records overnight, or waiting for weeks to restore servers from backup.

No wonder there's no dearth of headline-making cases involving schools, hospitals and even police departments in the US that have had their computer systems hacked into and forced to deposit "ransoms" ranging from $500 to $17,000 into criminals' bitcoin accounts.

High-profile cases that have been emerged in Hong Kong include that of The Chinese University of Hong Kong's Faculty of Medicine, which had records of more than 1,000 patients "held hostage" in 2014, with hackers demanding 0.6 bitcoin to have their files decrypted. The faculty, however, was said to have had its data backed up and just ignored the criminals' demands.

Small-and-medium-sized enterprises (SMEs) which, by and large, lack the resources to defend themselves against cyber attacks, make an easy target for hackers. About 30 out of 41 ransomware incidents reported in the past two months in the SAR involved SMEs.

Although attacked victims may have no choice, but to pay up in many cases, Wong advises it's still not wise to yield to these "ransom" demands.

Leung says: "It's anything but a simple question of 'trading money for safety' as victims may think. But, it's very likely they'll be inviting more ransomware attacks after the criminals found their first shots work." "How much money do you have to satisfy their insatiable appetite?" he asks. "Not to mention paying the ransom cannot 100 percent guarantee you'll get the decryption key from hackers and have your data back."

Typically, it's the idea of simply paying up that makes ransomware attacks a lucrative business, warns Leung. The average amount for freeing a hacked computer or decrypting files in Hong Kong soared to 4 bitcoins recently from half-to-one bitcoin in February. One bitcoin is equivalent to $420.

Leung believes such cyber holdups are rising and will continue to rise globally. The point is such dirty business goes far beyond extortion in the form of malware, and is more of an industry chain where hackers supply ransomware with different buyers to help them launch vicious ransomware-style attacks and have victims' devices held hostage.

Data from Symantec's latest report shows that the more damaging style of ransomware attacks grew by 35 percent last year, with more aggressive attacks spreading beyond personal computers to smartphones, Mac and Linux systems.

Earlier last month, ransomware attacks were reported to have gone beyond Microsoft's Windows operating system to Apple's Mac computers for the first time with ransomware "KeRanger", which locks data on Macs so users cannot access it, being downloaded about 6,500 times before Apple and developers were able to thwart the threat.

With ransomware extortion cases spreading like wild fires, it usually takes up to 229 days for them to be detected. One can hardly bank on firewalls completely to thwart such attacks. Therefore, data backup and a "human firewall" always matter a lot, advises Fred Sheu, a Hong Kong-based national technology officer at Microsoft.

The importance of backing up data as a hedge against cyber attacks can never be overemphasized and a "human firewall" stands as the last line of defense, says Sheu.

"Data are always priceless and their loss is unbearable," Leung says. "So, do not let criminals easily prey on your willingness to click on infected links, emails and photos from unidentified senders."

sophia@chinadailyhk.com

(HK Edition 04/15/2016 page8)

主站蜘蛛池模板: 锡林浩特市| 玛沁县| 安图县| 宁城县| 井研县| 宜城市| 太和县| 卢龙县| 体育| 会东县| 贺州市| 东台市| 吴忠市| 洪雅县| 安新县| 济阳县| 普定县| 弥渡县| 巴南区| 河池市| 上思县| 定襄县| 水富县| 临猗县| 衡南县| 周宁县| 炉霍县| 青海省| 三江| 普陀区| 阳谷县| 平和县| 永新县| 磐安县| 文安县| 仪陇县| 资源县| 乌拉特中旗| 巴南区| 饶平县| 上栗县| 平山县| 通州市| 东兰县| 慈溪市| 巴东县| 甘孜县| 临潭县| 湾仔区| 澜沧| 阿瓦提县| 措勤县| 增城市| 改则县| 江都市| 巴塘县| 福海县| 潍坊市| 普兰县| 云和县| 阳谷县| 乌什县| 五莲县| 岐山县| 图木舒克市| 宁都县| 陆丰市| 上思县| 德令哈市| 大关县| 郁南县| 天峻县| 永德县| 福州市| 巴林左旗| 台山市| 尉犁县| 嘉定区| 喀喇沁旗| 德州市| 华安县| 潢川县|