Mtanzania Anyakuwa Tuzo ya TEHAMA Kenya

Herbalist Dr MziziMkavu

JF-Expert Member
Feb 3, 2009
42,299
33,080
Mtanzania Anyakuwa Tuzo ya TEHAMA Kenya



Kila mwisho wa mwaka kumekua kukitolewa tunzo za utambuzi wa michango mbali mbali ya wana TEHAMA maeneo mengi ambapo mwaka huu Tuzo 31 zilitolewa jijini Nairobi Nchini kenya.

Moja ya Tunzo ilikua mwana usalama mtandao bora wa mwaka ambapo Mtanzania Yusuph kileo, Mtaalam wa maswala ya usalama mtandao na uchunguzi wa makosa ya Digitali ameitwaa tuzo hiyo ikiwa ni kutambua mchango wake mkubwa katika mataifa mbali mbali barani afrika.

Kileo amekua chachu ya kuimarisha usalama mitandao maeneo mengi , si tu barani Afrika bali pia nje ya bara la Afrika. na amekiri tuzo aliyo ipata itamuongezea hari ya kujituma zaidi katika maswala ya usalama mtandao.

Aidha, Katika kuzungumzia hali ya usalama mtandao hivi sasa Yusuph Kileo ameeleza, Si shwari na bado hairidhishi kwani bado mashambulizi mtandao yanaonekana kuendelea kujitokeza maeneo mengi duniani.

Kileo amefafanua ya kua kipi hiki pekee cha kuelekea mwisho wa mwaka mashambulizi milioni hamsini yametegemewa huku idadi kubwa tayari ikiwa imesha fikiwa.

Miongoni mwa waathirika ni pamoja na Mabenki, makampuni ya simu , mashule, hospitali na maeneo mengine mengi.

Kirusi kipya kinacho muwezesha mashine za kutolea fedha kutoa fedha zenyewe bila ya mhalifu kua eneo la tukio ni miongoni mwa yaliyo jitokeza kwa kipindi hiki cha kuelekea mwisho wa mwaka huku kirusi cha RANSOMWARE bado kikiumiza kichwa wana usalama mitandao hasa baada ya kupiga hodi barani afrika.

Kirusi ambacho kina mnyima mtumiaji halali wa vifaa vya digitali kutumia kifaa chake hadi alipe kiwango cha pesa.

Kileo amesisitiza yote yanayo jiri imekua yana ambatana na wizi mtandao ambapo fedha imekua ni tegemeo kuu – Kileo ameonya kama hali hii haita angaziwa kuna hatari ya Uchumi wa mataifa mengi kuyumba kutokana na wizi mtandao unaoendelea kuchukua sura mpya kila siku.chanzo.GBP
 
Malware Protection Center

Ransomware


Ransomware stops you from using your PC. It holds your PC or files for "ransom". This page describes what ransomware is and what it does, and provides advice on how to prevent and recover from ransomware infections.

You can also read our blog about ransomware: The 5Ws and 1H of ransomware.

On this page:


What does ransomware do?
There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

Ransomware can:

  • Prevent you from accessing Windows.

  • Encrypt files so you can't use them.

  • Stop certain apps from running (like your web browser).
Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.

There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.


Frequently asked questions
Expand all

Details for home users
There are two types of ransomware – lockscreen ransomware and encryption ransomware.

Lockscreen ransomware shows a full-screen message that prevents you from accessing your PC or files. It says you have to pay money (a “ransom”) to get access to your PC again.

Encryption ransomware changes your files so you can’t open them. It does this by encrypting the files – see the Details for enterprises section if you’re interested in the technologies and techniques we’ve seen.

Older versions of ransom usually claim you have done something illegal with your PC, and that you are being fined by a police force or government agency.

These claims are false. It is a scare tactic designed to make you pay the money without telling anyone who might be able to restore your PC.

Newer versions encrypt the files on your PC so you can’t access them, and then simply demand money to restore your files.

Ransomware can get on your PC from nearly any source that any other malware (including viruses) can come from. This includes:

  • Visiting unsafe, suspicious, or fake websites.
  • Opening emails and email attachments from people you don’t know, or that you weren’t expecting.

  • Clicking on malicious or bad links in emails, Facebook, Twitter, and other social media posts, instant messenger chats, like Skype.
It can be very difficult to restore your PC after a ransomware attack – especially if it’s infected by encryption ransomware.

That’s why the best solution to ransomware is to be safe on the Internet and with emails and online chat:

  • Don’t click on a link on a webpage, in an email, or in a chat message unless you absolutely trust the page or sender.

  • If you’re ever unsure – don’t click it!

  • Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spellings of company names (like “PayePal” instead of “PayPal”) or unusual spaces, symbols, or punctuation (like “iTunesCustomer Service” instead of “iTunes Customer Service”).
Check our frequently asked questions for more information about ransomware, including troubleshooting tips in case you’re infected, and how you can backup your files to help protect yourself from ransomware.


Details for enterprises and IT professionals
The number of enterprise victims being targeted by ransomware is increasing. Usually, the attackers specifically research and target a victim (similar to whale-phishing or spear-phishing – and these in fact may be techniques used to gain access to the network).

The sensitive files are encrypted, and large amounts of money are demanded to restore the files. Generally, the attacker has a list of file extensions or folder locations that the ransomware will target for encryption.

Due to the encryption of the files, it can be practically impossible to reverse-engineer the encryption or “crack” the files without the original encryption key – which only the attackers will have access to.

The best advice for prevention is to ensure company-confidential, sensitive, or important files are securely backed up in a remote, un-connected backup or storage facility.

OneDrive for Business can assist in backing up everyday files.

In some cases, third-party tools released by some security firms are able to decrypt files for some specifically ransomware families. See our blog FireEye and Fox-IT tool can help recover Crilock-encrypted files for an example. Tim Rains, Microsoft Director of Security, released the blogRansomware: Understanding the risk in April 2016 that summarizes the state of ransomware and provides statistics, details, and preventative suggestions to enterprises and IT professionals: Our Threat intelligence report: Ransomware also includes suggestions on prevention and recovery, statistics, and details.
Prevalent ransomware
Globally, ransomware continues to be a problem. In particular, we’ve seen increases in Italy and the eastern seaboard of the US.

The past six months (between December 2015 and May 2016) have seen the rise of Tescrypt globally. Crowti remains near the top of the pack, as does Brolo and FakeBsod.

Reveton has also dropped down the ladder, now at 1% of the top 10 share, down from 7% for the preceding 6 months.


top10families-2015-2016.png

Figure 1. Top 10 Ransomware (December 2015 to May 2016)


Ransom-November2015.png

Figure 2. Top 10 Ransomware (June to November 2015)

For the top 10 countries with the most detections, the United States takes a full half of all detections. Italy is second, followed closely by Canada, Turkey, and the United Kingdom. After that the distribution is spread across the globe.


top10countries-2015-2016.png

Figure 3: Top 10 countries (December 2015 to May 2016)

The greatest detections in the US were for FakeBsod, followed by Tescrypt and Brolo. Tescrypt was also prevalent in Italy.


sunburst-ransom-2015-2016.png

Figure 4: Top detections in top countries (December 2015 to May 2016)

FakeBsod uses a malicious piece of JavaScript code to lock your web browser and show a fake warning message when you visit a compromised or malicious webpage. The warning message tells you to “contact Microsoft technicians” about an “Error 333 Registry Failure of operating system – Host: Blue screen Error 0x0000000CE”. If you call the phone number in the message you will be asked to pay money to “fix” the issue.

An example of the fake warning message is shown in Figure 5:


Ransom3-November2015.png

Figure 5: Message used by FakeBsod to lock your web browser

You can regain control of your web browser without paying anything by closing the warning message using the Task Manager.

When you reopen your browser, make sure you don't click Restore previous session.

Read more about this threat in the Ransom:JS/FakeBsod.A description.

Top ransomware
Examples of ransomware



 
Back
Top Bottom