Eset

Ransomware is malware that can lock a device or encrypt its contents in
order to extort money from the owner in return for restoring access to
those resources. This kind of malware can also have a built-in timer with
a payment deadline that must be met, otherwise the price for unlocking
the data and hardware will grow – or the information and the device will
ultimately be rendered permanently inaccessible.

 

Among the well-known examples of ransomware affecting desktop
computers are Reveton, CryptoLocker, CryptoWall and TeslaCrypt; and on
mobile platforms Simplocker and LockerPin.

 

Analyses by ESET show that ransomware has emerged as a very popular
form of malware for cybercriminals, and that incidences of its use have
been rising for many years, targeting both privately owned as well as
business devices. Windows and Android are currently the most commonly
targeted operating systems, but recent research shows that even Linux
and OS X are not exempt from ransomware.

 

To help companies mitigate the risks of ransomware infection, this white
paper documents frequently used attack vectors, offers guidance on how to
effectively protect company devices and their contents, and describes the
available options when devices or files have already been taken hostage.

 

Additionally, it provides ESET’s views on the most pressing question that
victims of ransomware attack have to answer: “Should I pay what the
cybercriminals demand?”