Trend Micro -
It seems like every day there’s a new story about a ransomware attack. And while ransomware is certainly costly to the victim, the impact can trickle into society. One recent example is the ransomware attack against one of the largest gas pipelines in the United States, causing panic and raising the average gas price on the east coast. An increase in the scale of costly attacks led to the US government announcing they would treat ransomware attacks as a similar level of priority to terrorism.
As developers, you must do everything you can to protect yourselves and your products from ransomware attacks. To do so, let’s first look at what ransomware is, where it comes from, and how a typical attack may look. Then, we’ll explore some tactics for a strong recovery plan.
What is Ransomware?
A quick refresh: ransomware is a type of malware that infects the host system, locks down essential data and hardware, and then requires a ransom before a user can re-access their data. A regular attack will generally follow four steps. Let’s break down the different steps that a typical ransomware attack executes.
Attackers research the best platforms to attack and look for any