'KFS have worked with Discus on a number of projects for IT infrastructure – servers, Local Area Networking, workstations and laptops, Wide Area Networking (VPNs - both site to site and secure remote access), security, email, spa... Martin Davies, Key Forensic Services - Coventry
Simple Explanation of Ransomware, and how you could get infected Posted by Damien Biddulph on Wed 17th May 2017
A spam email is sent to as many email addresses as possible, these are obtained from various sources, previous hacks, social media etc
Anti-Spam filters will stop the majority – 99%, but some still get through
The email is either a link to a compromised website (such as WordPress) or it is an attachment with a zip file which anti-spam filters cannot scan
Gateway Security – stops traffic to some of the locations where these files are hosted but not all…
The user receives the email, it’ll look legitimate, possibly even with personal information to validate it. Your home address, sometimes even your phone number and or full name will be on it. It’ll have a zip file or a link, with a password to open it.
Most users will ignore the email and dismiss it as spam, some will open the link/attachment and let the virus run.
Once the Virus is executed, it’ll use the machine as a temporary host, then start searching for any potential venerable machine, searching for any potential weakness it can exploit, it’ll run this constantly until it is destroyed by a virus checker or a kill switch is activated.
If you need further help contact Discus Systems plc on 01675 430080