e computer’s hard drive and encrypted the files’ names. In addition to these flaws, the decryption key could be derived from the malware’s code.
Six years after its lacklustre debut, two researchers named Adam Young and Moti Yung tweaked the primordial ransomware and fixed its fundamental flaws by removing the decryption key from the malware itself. This enhanced algorithm is known as public-key cryptography and it paved the way for the ransomware variants we deal with today.
Leaked NSA exploits aside, ransomware invariably spreads by tricking victims into infecting themselves. The most common ways this occurs is by hiding the malware in an email attachment or on the other end of a URL embedded into an email or instant message. The best things you can do to avoid having your files kidnapped is exercise caution when dealing with emails and messages from unknown senders, keep all your software updated and frequently back up your important files.
Although attackers say they will restore your files after receiving their ransom demands, there’s no honour amongst thieves, so the best thing to do is not pay. By having recent backups of your files, you can easily restore them to a recent version.
After all, with the hackers behind WannaCry reportedly netting more than £100,000 (AUD$168,000), ransomware won’t be going anywhere anytime soon.