Hello friends!
I will start this blog with a fun fact. Not so fun, actually. Did you know that Q2 of 2021 saw the highest volumes of ransomware attacks ever? That was only the tip of the iceberg, as global ransomware attack volume increased by 151% in the first 6 months of 2021 in comparison to year-ago half!
Forced by the pandemic to use technology as a means for communication, people have turned to devices and gadgets more than ever before. This was the perfect gateway for hackers to launch cyber-ransom attacks, especially to the most vulnerable - the elderly.
This blog will define ransomware and its types and will teach you how to deal with it and ultimately get rid of it from your devices. Let's get started!
BACKGROUND INFORMATION
Before going any further, it is kind of manadatory to understand the foundations of ransomware. Let us watch this short video made by cybersecurity experts from Kaspersky that explains what ransomware is:
Let's put all that knowledge into words now. To do that, I am going to cite some other cybersecurity experts, this time our friends from McAfee: 'ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. Ransomware is often designed to spread across a network and target database and file servers, and can thus quickly paralyze an entire organization. It is a growing threat, generating billions of dollars in payments to cybercriminals and inflicting significant damage and expenses for businesses and governmental organizations.'
They then go even further, explaining the exact mechanism ransomware operates by: 'ransomware uses asymmetric encryption. This is cryptography that uses a pair of keys to encrypt and decrypt a file. The public-private pair of keys is uniquely generated by the attacker for the victim, with the private key to decrypt the files stored on the attacker’s server. The attacker makes the private key available to the victim only after the ransom is paid, though as seen in recent ransomware campaigns, that is not always the case. Without access to the private key, it is nearly impossible to decrypt the files that are being held for ransom.'
Put simply, ransomware is a form of cyber-blackmailing that demands that the victim paid a ransom (often in the shape of cryptocurrency) in order to get access back to their personal information, which was previously locked or encrypted by attacker. Kind of nasty, wouldn't you agree?
TYPES OF RANSOMWARE
![]()
There are 3 main types of ransomware:
- scareware - this type of ransomware usually takes the shape of in-your-face, pop-up messages warning you that malware was just found on your device and the only way to get rid of it is to pay up the ransom, essentialy being the least threatening ransomware type, as your files are currently safe;
- screen lockers - this type of ransomware usually takes the shape of full-size windows appearing right after powering up your device that reads something related to illegal activity being discovered on your gadget and a fine must be paid - medium level threat;
- encryption - this type of ransomware usually takes the shape of files and other sensitive personal data getting snatched from your device and then encrypted, the attacker then demanding payment for their decrypted return to their rightful owner - high level threat, as no one can guarantee you'll even get your files back after paying the ransom.
HOW TO PROTECT YOURSELF FROM RANSOMWARE
- maintain your device's OS patched and up-to-date;
- don't install unauthorized software and never give it admin rights for running;
- have an up-to-date antivirus software installed on the device;
- (optional) have an up-to-date anti-malware software installed on the device;
- back up your most sensitive information, both digitally and analogically.



