Malware: Trojan displaces virus

In Latin, 'malus' means bad, evil or vile. And this is also how malware programs behave. They nest in computers or servers in order to execute unwanted functions. Although we also count 'computer viruses' as malware, simply infecting or destroying a computer is on the decline. Today, malware typically appears in the form of Trojans, which secretly board the bridge, usually unnoticed by the user.

Trojans are a problem for the external IT service because the fault usually lies with the person operating the customer's mouse or keyboard. It is this person who opens the gates for the intruder. In most cases, Trojans get onto the computer through the careless downloading of email attachments or programs from obscure sources, or through under-complex passwords.

Our IT service therefore focuses primarily on user training. After all, being alert and informed is the best protection against intruders. Our service also includes analyzing obscure attachments. Our customers can forward suspicious cases to us before they carelessly press the mouse button.

Ransomware - ransomware solves nothing

The number of cases where a 'ransom' is to be extorted by blocking the computer is increasing. The user of a computer sees a 'demand' from the attackers on the monitor instead of the usual working environment, but their data is encrypted. The perfidious thing about this is that the method itself is increasingly becoming a hindrance: If the victim responds to such a demand, their computer usually remains blocked anyway. Only very rarely can you 'buy your way out' with Bitcoins. Whoever pays therefore looks just as stupid as the person who refuses to pay. Which increasingly takes away any 'business character' from the use of 'ransomware' ...

Ransomware has long worked independently of the operating system. Whether Linux, Mac OS or Windows, all users are affected by this digital form of highway robbery. The instructions for building the ransomware, the so-called 'CrimeWare kits', are circulating on the DarkNet. The program often does not encrypt the entire computer, but mainly the data that is important to the user, such as the 'My Documents' folder under Windows.

Protection against ransomware is very similar to protection against other viruses or Trojans. For example, a user receives an email with the attachment of an unpaid invoice, with a threat of punishment from the Federal Criminal Police Office, or with alleged usage violations by GEMA. Anyone who opens such an attachment has already handed the blackmailers the 'house key'.

You should therefore NEVER open an e-mail attachment that does not come from an absolutely trustworthy source. GEMA and the BKA still use good old snail mail. It is also important to regularly back up all relevant data on external data carriers, as this keeps it out of reach of the blackmailers. Browsers can be protected against the execution of critical Java commands by installing applications such as 'NoScript', and even ad blockers offer increased protection.