• digicash420@gmail.com

Upload Files Carefully As Experts Uncover New Ransomware

Upload Files Carefully As Experts Uncover New Ransomware
Photo by Sergei Starostin on Pexels.com

You are likely aware that you should not click on URLs that download unfamiliar files onto your computer. It was brought to our attention that uploading files can also get you into problems. As a precaution, upload files carefully as experts uncover new ransomware. 😮

The current generation is significantly more powerful than earlier generations of web browsers. They can change data within the browser within the local file system located on the computer. Oh, it gets better.

By simply clicking a button, users can send and receive emails, listen to music, and watch movies inside the confines of a browser software.

Unfortunately, these capabilities also mean that hackers can find innovative ways to manipulate browsers to deceive you into allowing ransomware to lock your files when you believe that you are simply performing your typical activities online.

Through the use of the File System Access Application Programming Interface (API), which enables web programs in modern browsers to connect with the users’ local file systems, hackers have demonstrated how one can acquire access to the data on your computer.

The threat is only applicable to the browsers Chrome and Edge from Microsoft, but it does not affect Safari from Apple or Firefox from Mozilla. These two are top-notch when it comes to web browsers.

Edge is the only browser that accounts for 5% of all browsers used, while Chrome accounts for 65%. To the best of my knowledge, there have been no reports of hackers employing this strategy up until this point.

code projected over woman
Photo by ThisIsEngineering on Pexels.com

We have contacted the developers responsible for the File System Access API, and they have shown support for our work and interest in our strategies for guarding against this kind of attack. Among my colleagues is a Google security researcher, and we have also communicated with them.

Additionally, we have sent a vulnerability report to Microsoft; however, we have not received any response from them. As I said previously, upload files carefully as experts uncover new ransomware.

Catch 22

Today’s web browsers are extremely similar to operating systems in their own right. They are capable of encrypting information and running software programs.

Combining these capabilities with the fact that the browser has access to the files of the host machine through the File System Access API, including files stored in the cloud, shared folders, and external drives, presents a new possibility for ransomware.

Imagine that you want to alter images using a free online photo editing program that appears to be completely harmless. Any malicious editing program that is under the hands of hackers can access the files on your computer through your browser when you submit the images for modification.

Hackers would be able to access the folder from which you are uploading as well as all of the subfolders within that folder. After that, the hackers could encrypt the files that are stored in your file system and then demand a ransom payment to remove the encryption.

Are you in love with computers now? Keep reading.

There is a rising concern with ransomware. Both individuals and organizations have been the targets of attacks.

These attacks have targeted Fortune 500 companies, banks, cloud service providers, cruise operators, threat-monitoring services, chip manufacturers, governments, medical centers and hospitals, insurance companies, schools, universities, and even police departments.

The number of ransomware payments that corporations made to their attackers in 2023 exceeded 1.1 billion United States dollars, and 19 ransomware attacks attacked organizations every single second.

It should come as no surprise that ransomware is currently the most important weapon in the arsenal of hackers and security experts. After hackers have successfully deceived you into downloading traditional ransomware, it will begin to spread across your machine.

New Defense on How To Upload Files Carefully as Experts Uncover New Ransomware

According to the results of our testing, RøB possesses the capability to encrypt a wide variety of file types. Since RøB operates within the browser, there are no harmful payloads that a conventional antivirus product can detect and safeguard against.

The fact that this sophisticated browser-based malware represents a threat to existing ransomware detection technologies indicates that these systems confront several challenges.

To protect against this new strain of ransomware, we presented three distinct protective strategies. These methods function on multiple levels, whether it is the browser, the file system, or the user, and they complement one another accordingly.

Moreover, to identify encrypted user files, the first method involves momentarily stopping a web application, which is a program that operates within the browser. The second method involves keeping an eye on the activities of the web application that is running on the user’s PC to recognize patterns that are similar to ransomware.

The third strategy involves the implementation of a new permission dialog box, which is designed to provide users with information regarding the potential dangers and repercussions that are involved with granting web apps access to their computer’s file system.

When it comes to the security of your computer, you should exercise caution regarding the locations from which you download and upload files. Hackers might be able to gain access to your computer through the files that you submit. 

I hope this helps. Now, think three times before clicking on a random link. Peace.

Leave a Reply

Your email address will not be published. Required fields are marked *