How JavaScript has made Ransom32 one of the most sophisticated types of ransomware for Windows and what can be done to prevent such security flaws.

Ransomware has made its appearance a long time ago, taking advantage of the vulnerabilities in the security department of desktops. Many times, the users could not get rid of the ransomware without paying a significant fee. Not only individuals, but also police departments have been infected by such flaws, adding phishing in the game.

Nowadays, with the involvement of JavaScript, a new type of ransomware has been introduced online. This is Ransom32, using a fork of Node.js or else known as NW.js. on Windows.

Being masked as a file you need to download (for example in torrents for movies, series and other stuff), the ransomware will grab hold of your device and not let go. Since it involves the execution of a file with the .exe format, Ransom32 does not target Linux or Mac users. This does not happen due to the enhanced security of these platforms, rather than the anatomy of the ransomware itself.

One way of keeping the threats at bay would be to make the most out of the right security settings on your browsers. Not allowing any JavaScript file to be executed without your prior knowledge and consent is a great thing to consider.

Manual execution is the key to success, as you would have to check everything and see whether or not you have truly authorized such an execution.
EMSISOFT has published an article on the importance of fully comprehending Ransom32.

In addition, they suggest antivirus software that will most likely prevail against it. As they quote on the article: “We consider ransomware one of the biggest threats of the past year and plan to do our best to continue our excellent track record in the next year, to keep our users as protected as possible.”

With the proper security measures and with right tactics while downloading online, ransomware may be dealt with efficiently.

Image from Flicker

Leave a comment

Your email address will not be published. Required fields are marked *