Ransom, Malwares & Joseph

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

someone writing in a notebook
Pen pals were the old school catfishing back in the day.
Photo by lil artsy, please support by following @pexel.com

Hey, do you remember the time when you could check the email that you had gotten from a random stranger and have nothing to worry about? Like the thought of you and them becoming pen pals was a possibility.

No, of course, no one would think that way since we’re all trained, due to our parents from a young age to stay away from strangers. However, let’s say that you did, and you were curious as to how this random chance of friendship would play out.

You email each other back and forth and things are going swell, right up until you get a notification saying, “You have twenty-two hours to hand over $65,356.34 if you want any chance of getting your computer back to normal and your dirty little secrets from being exposed.” This scenario isn’t exactly how the attack plays out, but you get the idea, your pseudo-friend has dirt on you and wants you to pay up or else.

two men sat across from each other.
Jake: I’m going to make you an offer you can’t refuse.
Steve: I refuse.
Jake: Okay, I didn’t see that coming so quickly. Oh gosh, you didn’t even think about it.
Photo by cottonbro studio, please support by following @pexel.com

You got Blockbuster

So back in 1989, hot movies were being released like Road House, Batman, and Indiana Jones and the Last Crusade, and the internet was booming. There was the raise of AOL or what’s better known as America Online, the movie The Godfather had been out for some years before then and people were drawing inspiration from the famous line that most jobs and now what seems like the current stance of every landlord, utility service provider, or insurance company are saying, “I’m going to make you an offer you can’t refuse.” Someone who may have taken inspiration from this movie was Joseph L. Popp.

A Harvard-trained evolutionary biologist who was the first person ever to create a ransomware virus. For those who don’t know, ransomware is a type of malware that acquires the victim’s information and denies access until the demands are met. These demands could be sending money, demanding the “truth” if it’s an activist act, or sending nudes. That last one was silly but I’m sure there’s some hacker out there using ransomware on Only Fans accounts for nudes.

Along with the creation of ransomware came interesting names such as “AIDS Trojan” and “PC Cyborg”. Popp made like capitalism and capitalized on the AIDS epidemic by sending out 20,000 infected diskettes labeled “AIDS Information” to people of the World Health Organization or widely known as W.H.O.

a photo of a diskette
Most if not all people of today have no clue what this is. Let me introduce you to the diskette.
Photo by Pixabay, please support by following @pexel.com

The diskettes housed malicious code able to hide file directories, lock file names, and demand victims send $189 to a PO Box in Panama to get their information back. This was the first generation of ransomware, and things have become more advanced since then.

man looking evil with a glass of scotch.
I drink, code viruses, and know things…for the right price.
Photo by cottonbro studio, please support by following @pexel.com

Father of Ransoms

After Joseph was deemed “The Father of Ransomware”, what category of people came to follow in his footsteps, not only to use but later improve this malware? They are called hackers and just a side note; anyone can use malware making them cyber-attackers, but I’m going to use hackers since their main objective is to exploit for profit.

Hackers tend to use ransomware via various methods such as phishing emails with malicious files attached, and drive-by downloading – a method where a file is downloaded without your interaction. And finally spoofing – is another method where a hacker is posing as a trusted entity.

Hackers can often obtain Ransomware-as-a-Service (RaaS) or malware-for-hire which has easier use and is cost-efficient for performing ransomware attacks. This is insane because this means hackers actually have a budget created to perform cyber-attacks. There are several ransomware variants, some of which could have you buck-naked out in the cold (or heat, depending on when and where you’re at in the world).

Popular ones are Ryuk – delivered through spear-phishing emails or gaining access to a desktop remotely, this variant can encrypt certain files avoiding the crucial ones for the computer’s operation and presenting the demand for ransom.

Ryuk can account for an average of $1 million. Maze can combine file encryption and data theft, this is done with the intent that if the victim decides not to pay the ransom their information could be exposed, sold online, or both.

REvil also known as Sodinokibi is a variant that has large organizations on the menu. This variant has been responsible for a number of large data breaches, a couple being “Kaseya” and “JBS” and has been known to have demanded a ransom of $800,000.

Lockbit, operating since September 2019, this variant rapidly encrypts data to prevent detection by security appliances and SOC (System and Organization Control) teams. There are a couple of other variants but at this junction, you pretty much get the point, they get access to your information, lock you out, and hold it for ransom.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

man sat holding his face.
What makes you think I can pay this ransom when I can’t even pay my rent?
Photo by Wallace Chuck, please support by following @pexel.com

Payments Not Made

Being hit with a ransomware attack is insanely dangerous and many vital organizations such as hospitals and public services have experienced significant losses from it as not paying the ransom can halt access to critical care.

Paying the ransom can lead to a chain reaction of events, a few being loss of the money used in ransom payment, productivity time lost, and the need to hire IT for disaster and recovery. And choosing not to pay the ransom could lead to whatever consequences the hacker has set in place.

So, how do you stop your information from being held against you? Well, there are a number of ways, most of which are pretty basic and get overlooked every day since we’re all creatures of habit.

Avoid clicking on links sent via email or other messaging means, staying away from compromised websites, ones where you may get a warning from your browser which displays “This site is not secure and may be unsafe, turning back is recommended.” Heed this warning as it may save you and your computer from being hit with a drive-by download.

And the most likely out of the bunch, if you suffer from being attracted to shiny things as I do, are ads that may pop up on your screen. A malicious link could be hidden within the ad to redirect you to an un-secure site for some non-consent time for your computer.

person sat with a mask in a hoodie holding a bank card.
Subscribe today so you or someone you know doesn’t have to experience ransomware or I will gain access to all your secrets.
Photo by Tima Miroshnichenko, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you think there’s something I missed on ransomware and want to add? Script a comment below.

Protect Yourself from Fake Browsers: Spotting, Guarding, and Engaging

Key Takeaways

  • Fake browsers are dangerous imposters that steal data and expose you to online threats.
  • Signs of a fake browser include unusual performance, strange URLs and branding, and uninvited extensions.
  • Using a fake browser can lead to data theft, malware infection, and phishing attacks.
  • Protect yourself by downloading browsers from official sources, keeping software updated, using security software, and considering browser extension blockers.
  • Beware of fake browser update scams and know that headless browsers are a legitimate tool.
Keep in mind what doors you open.
Photo by Dids, please support by following @pexel.com

Introduction

Imagine your web browser, the key to unlocking the vast world of the internet, leading you down a dark alley instead. Fake browsers, malicious software masquerading as legitimate ones, pose a significant threat to online security. They lurk in the shadows, waiting to steal your information and expose you to online dangers.

Recognizing a Fake: Trust But Verify

Spotting a fake browser demands a healthy dose of skepticism. Here’s how to tell the imposter from the real deal:

  • Suspicious Performance: Frequent crashes, unusual slowdowns, and an overwhelming presence of ads are potential red flags. A legitimate browser should run smoothly and prioritize user experience.
  • URL Shenanigans and Branding Blunders: Scrutinize the download page URL and branding within the browser. Misspellings, odd domain names, and logos that seem slightly “off” are signs of trouble.
  • Uninvited Guests: Pre-Installed Extensions and Features: Beware of browsers that come pre-loaded with extensions or features you never opted for. These could be tools for snooping on your activity or injecting malware.

The Perils of Deception: What Lurks Beneath the Surface

The consequences of using a fake browser can be dire:

  • Data Theft Extravaganza: Fake browsers can record your keystrokes, passwords, browsing history, and other sensitive information, leaving you exposed and vulnerable.
  • Malware Menagerie: They can act as gateways for malware, unleashing a torrent of viruses, ransomware, and other malicious programs that can damage your device and steal your data.
  • Phishing Phantoms: Fake browsers can redirect you to cleverly disguised phishing websites. These mirror legitimate sites, tricking you into surrendering your personal information to cybercriminals.
You can lessen the work for your anti-virus software by learning security best practices.
Photo by Alexander Zvir, please support by following @pexel.com

Building Your Digital Fortress: Protecting Yourself from Fake Browsers

Knowledge is the first line of defense against online threats. Here’s how to fortify your defenses:

  • Download from the Source: Trust Only the Official Gates Always download browsers directly from their official websites or trusted app stores. Avoid third-party sources that could be harboring disguised malware.
  • Software Updates: Your Digital Armor Regular updates often include security patches that plug vulnerabilities exploited by fake browsers. Keeping your software current is crucial.
  • Security Software: Your Digital Guard Dog Utilize reputable antivirus and anti-malware software to detect and block potentially harmful fake browsers before they can infiltrate your system.
  • Consider Browser Extension Blockers: An Extra Layer of Security Explore reputable browser extensions designed to block access to malicious websites. This can add an extra layer of protection.

Engage with Us: Share Your Experiences and Fight the Threat

Have you ever encountered a fake browser? Share your experiences and any tips you may have in the comments below. Let’s work together to raise awareness and create a safer online environment for everyone. Remember, informed users are empowered users.

Oh you guys don’t me, just keep doing what you’re doing.
Photo by SHVETS production, please support by following @pexel.com

Fake Browser Update Scams: A Sneaky Tactic

Be wary of pop-up messages or website prompts urging you to download a browser update. Legitimate browsers typically handle updates automatically or notify you through trusted channels, not through random websites.

Headless Browsers: Not Inherently Evil

You might encounter the term “headless browser” during your research. These are legitimate browsers used for automation purposes, often invisible to the user. Knowing this distinction can prevent confusion when encountering the term.

Conclusion: Knowledge is Power, Stay Secure

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!

Don’t forget to share.

Every Second Counts. Help our website grow and reach more people in need. Donate today to make a difference!

One-Time
Monthly
Yearly

Make a one-time donation

Make a monthly donation

Make a yearly donation

Choose an amount

$5.00
$15.00
$100.00
$5.00
$15.00
$100.00
$5.00
$15.00
$100.00

Or enter a custom amount

$

Your contribution is appreciated.

Your contribution is appreciated.

Your contribution is appreciated.

DonateDonate monthlyDonate yearly

Navigating Learning Plateaus: Tips for Growth

Motive Sundays

Hitting a Wall While Learning? It’s Normal. Here’s How to Break Through

Learning isn’t always sunshine and rainbows. Sometimes, you feel like you’re making great strides, picking up new things left and right. But other times, it’s like you’ve hit a wall. You study for hours, but nothing seems to stick. Don’t panic! This “learning plateau” is a normal part of the process, and there are ways to get past it.

Why We Get Stuck

Learning new things is hard work for your brain. It takes time to absorb information, practice skills, and make connections. At first, everything feels exciting and new, so progress is rapid. But as you get better, improvement slows down. That’s the plateau – it doesn’t mean you’re not learning, it just means it’s happening more subtly.

The Struggles of the Plateau

  • No Obvious Progress: It’s tough to stay motivated when you don’t see clear results. You might feel like you’re spinning your wheels.
  • Motivation Drain: Without that initial rush of accomplishment, it’s easy to lose steam. Studying starts to feel like a chore.
  • Doubt and Frustration: You might start questioning yourself – “Am I even good at this?” Frustration can build, making it even harder to learn.
  • Burnout: Pushing too hard without a break can lead to burnout, where you just can’t face the material anymore.
I could stand to take a break from learning.
Photo by Andrea Piacquadio, please support by following @pexel.com

Breaking Through the Wall

  • Small Victories: Break down your big goals into tiny, achievable steps. Celebrate these mini-wins to stay motivated and see your progress.
  • Shake Things Up: Try a different approach! If you’re stuck in a textbook, watch videos, join a discussion forum, or find a study buddy.
  • Rest and Recharge: Take breaks! Sometimes stepping away for a bit allows your brain to process information better and come back fresh.
  • Get Feedback: Ask a teacher, mentor, or friend for constructive criticism. It can open your eyes to areas you might be missing.
  • Learn Something New: Explore a completely different topic! It can spark new ways of thinking and even benefit your main area of learning.
  • Back to Basics: Sometimes revisiting the fundamentals can solidify your understanding and uncover gaps in your knowledge.
  • Embrace the Plateau: It’s not a sign of failure, it’s a sign of progress! Use this time to solidify your foundation and avoid burnout.
  • Stay Curious: Never stop asking questions and exploring. Curiosity is the fuel that keeps learning exciting.
  • Find Your Tribe: Learning with others can be a huge motivator. Join a group, or online forum, or find a study buddy for support and encouragement.
  • Chill Out: Feeling stressed and frustrated hinders learning. Practice mindfulness techniques to stay present and manage negative self-talk.

The Climb Continues

Learning is a journey with ups and downs. The plateau may feel like a setback, but it’s actually a chance to strengthen your foundation and prepare for the next climb. Remember, everyone hits these walls – even the experts. With the right strategies, you can break through and keep moving towards your goals. There’s a whole world of knowledge out there waiting to be explored, and you have the potential to conquer it, one plateau at a time. So keep learning, keep growing, and enjoy the view from the next peak!

Love learning tech? Join our community of passionate minds! Share your knowledge, ask questions, and grow together. Like, comment, and subscribe to fuel the movement!