Video: Malware and ransomware

  • Transcript

    00:00
    The internet is home to an infinite amount of great content.

    00:04
    There are videos of cats,

    00:06
    pictures of cats,

    00:08
    GIFs of cats,

    (ON SCREEN TEXT: ME: DON’T OPEN THAT EMAIL FROM DRAKE. ALSO ME: I SHOULD OPEN IT)

    (ON SCREEN TEXT: CUTE)

    00:09
    memes with cats in them, you name it —

    (ONSCREEN TEXT: CHANGE WALLPAPER TO ‘CAT_01_CUTE?”. )

    00:12
    lots of great stuff lives on the internet.


    00:15
    Unfortunately, there are also cyber threats out there that can prevent you from enjoying an endless stream of cat-based content.

    (ON SCREEN TEXT: MALWARE MalwareMalicious software ("malware") designed to infiltrate or damage a computer system, without the owner's consent. Common forms of malware include computer viruses, worms, Trojans, spyware, and adware. It can: • Intimidate you with scareware, which is usually a pop-up message that tells you your computer has a security problem or other false information. • Reformat the hard drive of your computer causing you to lose all your information. • Alter or delete files. • Steal sensitive information. • Send emails on your behalf. • Take control of your computer and all the software running on it. )

    00:22
    One of the most common cyber threats is malware:

    (ON SCREEN TEXT: VIRUS VirusA computer program that can spread by making copies of itself. Computer viruses spread from one computer to another, usually without the knowledge of the user.  Viruses can have harmful effects, ranging from displaying irritating messages to stealing data or giving other users control over the infected computer. )

    (ON SCREEN TEXT: WORM WormA malicious program that executes independently and self-replicates, usually through network connections, to cause damage (e.g. deleting files, sending documents via email, or taking up bandwidth). )

    00:25
    malicious software SoftwareA computer program that provides instructions which enable the computer hardware to work. System software, such as Windows, Linux or MacOS, operate the machine itself, and applications software, such as spreadsheet or word processing programs, provide specific functionality. created to cause damage to your data, device or network NetworkSeveral computers that are connected to one another. .

    (ON SCREEN TEXT: SPYWARE SpywareSoftware that collects personal information about you without you knowing. They often come in the form of a ‘free' download and are installed automatically with or without your consent. These are difficult to remove and can infect your computer with viruses. )

    (ON SCREEN TEXT: TROJAN TrojanA malicious program that is disguised as or embedded within legitimate software.  HORSE)

    00:30
    There are many types of malware that serve lots of different purposes.
     
    00:35
    Ransomware RansomwareRansomware is a type of malware that restricts access to your computer or your files and displays a message that demands payment for the restriction to be removed. The two most common means of infection appear to be phishing emails that contain malicious attachments and website pop-up advertisements. is one of them.

    (ON SCREEN TEXT: RANSOMWARE)

    00:37
    Ransomware is pretty much what it sounds like — a type of malware that holds your data, devices or network for, well, ransom.

    00:46
    Ransomware locks your screen or encrypts your files and holds them hostage until you send money

    00:51
    (often in an untraceable digital currency like Bitcoin) to the attackers

    00:56
    Unlike some other types of malware, it’s very easy to tell if you have ransomware on your system.

    (ON SCREEN TEXT: HELLO I’M RANSOMWARE)

    (ONSCREEN TEXT: “c:\threat message. We have all your files if you want them back transfer money to this account: url URL(Uniform Resource Locator) Uniform Resource Locator is the technical term for the address (location) of a resource on the internet such as a website or file. .2398hj2nk”)

    01:02
    That’s because it proudly announces itself — usually with a popup page explaining the terms of the ransom.

    (ONSCREEN TEXT: “THERE HAS BEEN ILLEGAL ACTIVITY RECORDED ON YOUR DEVICE.”)

    01:08
    Sometimes ransomware messages look like they’re from law enforcement, saying your device is locked because you’ve done illegal things online.

    01:16
    This scare tactic is a lie to make people panic and react.

    (ON SCREEN TEXT: HOW DO YOU PROTECT YOURSELF?)

    01:20
    So how do you protect yourself?

    0:1:23
    Luckily, the steps to prevent malware are basic cyber safety measures you should be doing anyway, like

    (ONSCREEN TEXT:  “new email.” “hello user YOUR ACCOUNT IS IN gEOPARDY dabsjdla(*&(@gmail.com”.)

    01:30
    keeping an eye out for phishing PhishingAn attempt by a third party to solicit confidential information from an individual, group, or organization by mimicking or spoofing, a specific, usually well-known brand, usually for financial gain.  messages

    (ONSCREEN TEXT:  “UPDATE UpdateUpdates to software and devices add new features, fix bugs, and often contain new security features to protect against attacks. ”)

    01:32
    making sure your OS and software are updated

    (ONSCREEN TEXT:  “ANTIVIRUS, FILTER FilterSoftware that screens information on the internet, classifies its content, and allows the user to block certain kinds of content. , FIREWALL FirewallA security barrier placed between two networks that controls the amount and kinds of traffic that may pass between the two. This protects local system resources from being accessed from the outside. ”)

    01:35
    using cyber security tools like antivirus software, spam SpamAny unsolicited commercial electronic message. It is often a source of scams, computer viruses and offensive content that takes up valuable time and increases costs for consumers, business and governments. Canada's anti-spam legislation applies to all commercial electronic messages. A commercial electronic message is any electronic message that encourages participation in a commercial activity, regardless of whether there is an expectation of profit. filters and firewalls and frequently backing up Backing upThe procedure for making extra copies of data in case the original is lost or damaged. your files offline.

    (ON SCREEN TEXT: BACKING UP)

    01:44
    When it comes to ransomware, this one is extra important.

    (ONSCREEN TEXT: “CLICK HERE FOR OUR NEWEST DEALS” “YOUR ACCOUNT HAS BEEN COMPROMISED” )

    (ON SCREEN TEXT: YOUR ACCOUNT HAS BEEN COMPROMISED!)

    01:49
    Being careful can prevent most malware on your device, but it only takes one click to get compromised.

    01:55
    If your device is infected with ransomware, don’t panic! Here’s what you can do to minimize the damage:

    (ONSCREEN TEXT: “WRONG NOPE STOP STOP DISCONNECT!”)

    02:01
    First, disconnect all devices from your network as soon as possible.

    02:06
    Some ransomware can spread to other connected devices.

    02:09
    Next, report the attack to law enforcement and, if necessary, call an IT expert to help you remove the malware.

    02:17
    You should also do a bit of cyber security cleanup,

    (ONSCREEN TEXT:  “Would you like to change your password PasswordCombination of letters and numbers you select to secure an account or device. ?” “Would you like to update?” )

    02:20
    like changing your passwords and updating your devices.

    (ON SCREEN TEXT: DO NOT PAY)
    (ON SCREEN TEXT: SEND E-TRANSFER? no NO)

    02:23
    Most importantly: do whatever you can to avoid paying.

    02:27
    You could end up on a list of people and organizations known to pay ransoms, putting yourself at even more risk for repeat attacks.

    02:36
    If your files are backed up, it will be easier to restore your data without paying the ransom.

    02:42
    Ransomware can seem scary.

    (ONSCREEN TEXT: “TIME TO BACKUP!”

    02:44
    But being prepared for the worst-case scenario can make it a lot more manageable,

    02:48
    so you can quickly get back to doing what you love online.

    (ON SCREEN TEXT: GET CYBERSAFE.CA)

    02:52
    Visit getcybersafe.ca for more information and advice on all things cyber security.

Date modified: