Antivirus

Why does ransomware keep evading your defenses?

About the authorNir Gaist, Founder and CTO of Nyotron, has worked with some of the largest Israeli organizations, written the cybersecurity curriculum for the Israel Ministry of Education, and holds patents for Behavior Pattern Mapping. Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach about 10 billion USD per year.…


About the author

Nir Gaist, Founder and CTO of Nyotron, has worked with some of the largest Israeli organizations, written the cybersecurity curriculum for the Israel Ministry of Education, and holds patents for Behavior Pattern Mapping. 

Ransomware has long been a menace for organizations and consumers. Global damage cost estimates reach about 10 billion USD per year. After all these years, why does ransomware continue to be so good at being so bad? The answer is a combination of the security industry’s history of largely ineffective responses to ransomware and how ransomware developers use psychology to trick users into thinking they’re responding to requests from a colleague or even donating Bitcoins to a children’s charity.

Ransomware is hardly new and unknown since it has been around since 1989. Yet it remains one of the most common and successful attack types. According to reports, there were over 180 million ransomware attacks in the first six months of 2018 alone. The adoption of cryptocurrencies and Tor have served to amplify the prevalence of ransomware dramatically.

minimising the ransomware threat

  • How to test anti-ransomware: This is how we do it
  • More than half of working adults don’t know what ransomware is
  • Every 14 seconds, an organization somewhere in the world falls prey to a ransomware attack. But the bad actors are not narrow in their focus and typically target many organizations and users at once. For example, think back to the global WannaCry attack that resulted in losses of almost $4 billion.  

    Ransomware

    Image credit: Pixabay

    How ransomware works

    The details of how one attack gets inside a system or an organization, i.e., its “attack vector” are irrelevant. It can be phishing, exposed RDP or any other avenue that ransomware developers leverage to get in.  

    Instead, let’s take a look at what happens when ransomware actually interacts with your file system and encrypts data. First, ransomware process(es) locates the files it wants to encrypt. These are most often based on file extensions and target your most valuable assets such as Microsoft Office documents or photos, while leaving operating system files intact to ensure that system will still boot. Then the malware encrypts that data in memory and destroys the original file. 

    One route ransomware takes is to save encrypted data into a new file and then delete the original. 

    Another option, and probably the most devious one, is to write that encrypted data into the original file itself. In this case, the original file name is left intact, complicating the recovery by making it difficult to distinguish between encrypted files and those that haven’t been encrypted. 

    A third method is for ransomware to create a new file like in the first option, but then instead of the delete operation use rename to replace the original file.

    After completing the encryption process, the infamous ransomware note is displayed. We know that part of the story quite well from the news coverage.

    Image credit: Pixabay

    Image credit: Pixabay

    (Image: © Image Credit: Geralt / Pi

    Read More

    Be the first to write a comment.

    Leave a Reply

    Your email address will not be published. Required fields are marked *

    Antivirus

    Nearly 8,500 small and medium businesses faced cyberattacks through mimic AI tools in 2025: Kaspersky

    Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools. In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices

    Global cybersecurity company Kaspersky said on Wednesday that nearly 8,500 users from small and medium-sized businesses (SMBs) faced cyberattacks in the year so far, where “malicious or unwanted software” was disguised as popular online productivity tools.
    In April, Kaspersky — a cybersecurity company that provides antivirus and other security software for computers and mobile devices — said that widespread adoption of artificial intelligence (AI) and machine learning technologies in recent years has provided “threat actors with sophisticated new tools to perpetrate attacks”…
    Read More

    Continue Reading
    Antivirus

    The best antivirus software of 2025: Stay safe from online attacks and ransomware scams

    These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…

    These antivirus tools can block online dangers, protect your data and shield your privacy and they are a lot cheaper than you think…
    Read More

    Continue Reading
    Antivirus

    Why This Budget-Friendly VPN & Antivirus Combo Is Blowing Up

    If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…

    If you’re looking to score a two-in-one deal, this discounted VPN + antivirus combo from Surfshark is sure to catch your eye…
    Read More

    Continue Reading
    Antivirus

    Hackers are using Google.com to deliver malware by bypassing antivirus software. Here’s how to stay safe

    Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected This malware only activates during checkout, making it a silent threat to online payments The script opens a WebSocket connection for live control, completely invisible to the average user A new browser-based malware campaign has surfaced, demonstrating how attackers are


    • Attackers use real Google URLs to sneak malware past antivirus and into your browser undetected
    • This malware only activates during checkout, making it a silent threat to online payments
    • The script opens a WebSocket connection for live control, completely invisible to the average user

    A new browser-based malware campaign has surfaced, demonstrating how attackers are now exploiting trusted domains like Google.com to bypass traditional antivirus defenses.

    A report from security researchers at c/side, this method is subtle, conditionally triggered, and difficult for both users and conventional security software to detect.

    It appears to originate from a legitimate OAuth-related URL, but covertly executes a malicious payload with full access to the user’s browser session.

    You may like

    • Google Apps Script abused to launch dangerous phishing attacks
    • Criminals hijacking subdomains of popular websites such as Bose or Panasonic to infect victims with malware: here’s how to stay safe
    • Cybercriminals have found a sneaky way of stealing tax accounts and even encrypted messages: here’s what you need to know

    Malware hidden in plain sight

    The attack begins with a script embedded in a compromised Magento-based ecommerce site which references a seemingly harmless Google OAuth logout URL: https://accounts.google.com/o/oauth2/revoke.

    However, this URL includes a manipulated callback parameter, which decodes and runs an obfuscated JavaScript payload using eval(atob(…)).

    The use of Google’s domain is central to the deception – because the script loads from a trusted source, most content security policies (CSPs) and DNS filters allow it through without question.

    This script only activates under specific conditions. If the browser appears automated or the URL includes the word “checkout,” it silently opens a WebSocket connection to a malicious server. This means it can tailor malicious behavior to user actions.

    Read More

    Continue Reading