Posts: 14,444
Threads: 9,519
Thanks Received: 9,035 in 7,185 posts
Thanks Given: 9,810
Joined: 12 September 18
06 June 21, 07:21
Quote:
How Much Do You Know about Avaddon Ransomware? Find Out Why It’s Dangerous and How to Proceed If Infected
The imagination of cyber criminals seems to be unlimited when it comes to developing new methods to obtain what they want from their victims. We often hear about new ransomware strains that make victims every other week all across the globe – and they are all getting more and more dangerous. One such ransomware strain is Avaddon ransomware. Let’s find out more about how it works and what you can do to prevent an infection!
Avaddon Ransomware: Definition of Main ConceptsIn general, ransomware can be defined as
Quote:a type of malware (malicious software) which encrypts all the data on a PC or mobile device, blocking the data owner’s access to it. After the infection happens, the victim receives a message that tells him/her that a certain amount of money must be paid (usually in Bitcoins) in order to get the decryption key. Usually, there is also a time limit for the ransom to be paid. There is no guarantee that, if the victim pays the ransom, he/she will get the decryption key.
Ransomware-as-a-Service represents
Quote:a new business model for ransomware developers. Like software as a service (SaaS), the ransomware developers sell or lease their ransomware variants to affiliates who then use them to perform an attack. The RaaS business model makes ransomware usable by non-computer-savvy persons.
Avaddon Ransomware: How Avaddon WorksIn the cybersecurity landscape, we’ve first learned about the Avaddon ransomware in February 2020; it has been offered with a Ransomware-as-a-Service model since June 2020.
Similar to how Maze ransomware proceeded, the Avaddon ransomware operators also have a data leak site where they expose the data of those who do not pay the ransom. Another significant aspect of Avaddon ransomware is that, apart from exposing the encrypted data, its operators also threaten to carry out DDoS attacks.
After a free decryptor was developed in February this year and made publicly available, the ransomware’s creators also updated their code to make sure they still succeed with their criminal activities.
...
Continue Reading