Cybersecurity is a rising concern. The soaring high figures that represent cyberattacks have been a cause of worry for businesses as well as cybersecurity professionals.
Ransomwares and phishing attacks have been a great threat throughout. Cerber is a ransomware that came into picture when 150,000 window users were infected worldwide via exploit kits in July 2016 alone.
What Happens When An Attack Is Launched?
The victim receives an email which contains an infected Microsoft office document attached to it. A malware is injected as soon as the user clicks & opens it.
When a device is attacked by the ransomware, Cerber encrypts the user’s files and demands money to decrypt and get the access back. The malware encrypts files with RC4 and RSA algorithms and renames them with a .cerber extension.
How Do You Know That You Have Been Infected By Cerber?
You will come to know that you have been attacked by the ransomware, when you’ll find a desktop note the moment you log in. Ransom notes will also be left inside folders that have been encrypted by the malware.
Apart from giving a notice about your files being encrypted, it also provides instructions on how to send the ransom amount to the attackers. The amount keeps on increasing with time and ranges from few hundreds to a thousand dollars.
Is It Possible To Decrypt Files Encrypted By Cerber?
It may or may not be possible. Though decryption tools were available for previous versions of Cerber. However, there is very less scope of recovering encrypted files for the most recent versions. Even paying the ransom amount does not guarantee that you will be able to recover your files.
How To Prevent The Ransomware?
Once your files are encrypted it is very difficult to restore them. So it is best to take preventive measures well on time. Install a latest antivirus software. Also make sure that you do not open any link or attachment sent from an unknown source.
Backup your data regularly and educate your employees about cyber security.
What Is Distinctive About Cerber
It has certain features which you must take a note of:
- It Talks – Surprisingly, it is a malware that talks and speaks to the victims. Some versions contain VBScript due to which you may hear audio alerts and messages informing that your files have been encrypted and you must pay the ransom amount to decrypt them.
- Works Offline – People might think that disconnecting the device may prevent files from being encrypted. However, this is not true as cerber does not need an active internet connection to operate.
For more information about IT Security, call Centex Technologies at (254) 213-4740.