النسخة العربية

Oman National CERT Towards a safe cyber environment

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

ISO/ IEC 27001: 2013 Lead Auditor training course – IRCA Certified

The ISO/IEC 27001 Lead Auditor training is an intensive five-day course where you’ll discover internationally- recognized best practice auditing techniques so you can confidently lead auditing activities...

View
Safer Internet Day 2019

Safer Internet Day 2019

To mark Safer Internet Day 2019 with the rest of the world, the Information Technology Authority (ITA), represented by Oman National CERT organizes...

View
Network Traffic Analysis workshop

Network Traffic Analysis workshop

A 03 day, practical course designed to give you a thorough understanding of Network Traffic Analysis which is essential in identifying malicious communications and troubleshooting devices and applications.

View
The 7th Regional Cybersecurity Summit

The 7th Regional Cybersecurity Summit

ITU-ARCC is organizing The 7th Regional Cybersecurity Summit which is kindly hosted by CITRA Kuwait on 21- 22 October 2018.

View
The 6th Arab Regional Cyber Drill

The 6th Arab Regional Cyber Drill

ITU-ARCC is organizing the 6th Arab Regional Cyber Drill (ALERT) for the Arab Region ,Kuwait (CITRA) from 23-25 October 2018.

View

Media Center

Share it

Online Incidents Report
Request OCERT Services
Information Security Glossary

OCERT News

 

Ransomware Malware

OCERT Latest News

22/May/2016


Ransomware

Ransomware is a type of malwares that prevents users from accessing their files. The Ransomware encrypts the files with strong encryption algorithm. Furthermore, some Ransomware locks the PC screen. Most Ransomware encrypts the files with strong encryption algorithms which are hard to be decrypted. To decrypt and regain access to your files, Ransomware demand payment from you in the form of a "Bitcoin" ransom.


Impact:
  • Most ransomware encrypts the files with strong encryption algorithms which are hard to be decrypted. To decrypt and regain access to your files, ransomware demand payment from you in the form of a Bitcoin ransom.
  • Within last few weeks various types for ransomwares are spreading around the world.
  • The top two ransomwares spreading around the world:
    • “Locky”: New type of ransomwares, most of the incidents reported that malware received through email attachments. The ransomware encrypts the files and rename them with the extension “.locky”.
    • “CTB Locker”: an old type of ransomwares, but new reports shows that they currently targeting websites files.
    • There are other known type of malwares such as TeslaCrypt Ransomware, Trojan-Ransom.NSIS.Onion.jmc, Ransom.FileCryptor.FixExplorer,etc.
Affected Operating System & Version:
  • Windows
  • Android
  • MAC
  • Linux
Solution(s):
  • Use caution when opening email attachments.
  • Do not follow unsolicited web links in email.
  • Maintain up-to-date anti-virus software.
  • Conduct routine backups of important files, keeping the backups stored offline.
  • Keep your operating system and software up-to-date with latest patches.
  • If you infected by a Rasnsomware, isolate the infected machine from the network where possible to prevent the malware from spreading.
  • Use available Ransomware Removal tools.
  • Conduct email security awareness among your employees to avoid being infected by similar malicious emails.
  • You can refer to Oman CERT article on Email security
    http://www.cert.gov.om/library_articles_details_arabic.aspx?article=1
Reference(s):


  • News Archive