What is Ransomware?
A type of malware, designed for extortion. When ransomware is activated it stops access to a device or the data on it until the victim pays a ransom. A common feature of ransomware is a countdown timer for a payment deadline, if payment is not made by the deadline the victim risks permanently losing access to data or the fee increases.
There are two main categories of ransomware: locker and crypto. Locker prevents the victim accessing the entire device, but does not encrypt the files. As locker ransomware does not encrypt it is typically easier to remove. Cypto ransomware does not lock the victim out from the device, but it does prevent access to files or data, by the use of encryption. This type of ransomware is effective on those who do not use offline or local backups.
Ransomware Evolution
Ransomware is not a new phenomenon and some variants existed as far back as 1989. Ransomware has constantly evolved and increased in sophistication to suit the end user landscape. Ransomware is not an issue that only affects Windows devices. Variants have been detected that also target Android, macOS and Linux, this can be dangerous as people tend to only protect their Windows devices.
Notable Ransomware Variants Include:
- 1989 – AIDS Trojan
- 2012 – Reveton
- 2013 – Cryptolocker
- 2014 – Simplocker and LockerPin (Android)
- 2015 – TeslaCrypt and Locky
- 2016 – KeRanger (macOS)
- 2017 – KillDisk (Linux)
- 2017 – WannaCryptor/WannaCry
Ransomware Prevention
You can do many things reduce your risk of a ransomware attack, a starting point is the list below:
- Ensure you have a backup
- Filter EXEs in email
- Disable files running from AppData/LocalAppData folders
- Disable RDP
- Update your software and operating systems
- Use a reputable security solution
How ESET Keeps You Safe From Ransomware
About ESET
ESET has 30 years’ experience, over 1200 employees and is the 4th largest Business Endpoint Security vendor.
ESET offers endpoint protection for:
- Windows
- Mac OS
- Linux
- Android
And server protection for:
- File
- SharePoint
- Gateway
ESET Technology
ESET technology continually evolves to protect against the latest threats. ESET employs a multilayered strategy, not relying on a single protection point as a silver bullet. The most important points of protection for ransomware are: network attack protection, DNA detections and cloud malware system (ESET Live Grid).
Network Attack Protection: prevents the spread of ransomware by protecting against vulnerabilities
DNA Detections: performs deep analysis of code, extracting the “genes” that are responsible for its behaviour
ESET Live Grid: analyses submitted malware and provides results to endpoints without requiring an update.
Third Party Testing of ESET
ESET regularly participates in third party testing to validate that ESET technology is cutting edge.
In the first quarter of 2017, SE Labs tested the detection capabilities of the ESET Endpoint Security products. Their independent testing made it clear that ESET performs exceedingly well.

It important for a security solution to detect threats, but it is also important for it to not raise false alarms (false positives). False positives prevent your valid system and operational software from running and may crash your device. ESET seeks to deliver accuracy, detecting threats in a timely manner, while not raising false alarms.

Ransomware Reality Check Video
By Amy at 14 Aug 2017, 09:37 AM
Tags
Cryptolocker (4)
mandatory data breach notification (3)
whitepaper (1)
ESET (10)
Password (2)
GDRP (1)
Data Breach (3)
Data Loss Prevention (3)
encryption (1)
data (2)
compliance (1)
breached (1)
Kaspersky (2)
Malware (1)
Game Of Thrones (1)
Vulnerability (1)
BlueKeep (1)
Microsoft (1)
Windows 7 (1)
Windows Vista (1)
Windows XP (1)
Server 2003 (1)
Server 2008 (1)
We Live Security (1)
Notifiable Data Breach (1)
Virus (1)
Gartner Magic Quadrant (1)
Endpoint Protection (1)
Challenger (1)
Marketing (1)
cybercrime (2)
DESlock (1)
Safetica (2)
Potentially Unwanted Program (PUP) (1)
Google (1)
Chrome (1)
Christmas (1)
Authors
NathanAmy
Phoebe
Categories
TutorialNews
