Ransom-Demanding Trojan Virus On Prowl In Indian Cyberspace


"Payment of the ransom allows the user to download the decryption program, which is pre-loaded with the user's private key," it said.

The Trojan downloads encryption key by making a network connection to server names having the extensions like .biz, .co.uk, .com, .info, .net, .org and .ru.

The agency has suggested some counter-measures to keep systems safe from the virus attack which include steps like not downloading and opening attachments in emails received from untrusted users or unexpectedly received from trusted users.

"Exercise caution while visiting links to web pages, protect yourself against social engineering attacks, do not visit untrusted websites, enable firewall at desktop and gateway level and disable ports that are not required, avoid downloading pirated software, keep up-to-date patches and fixes on the operating system and application softwares and keep up-to-date antivirus and antispyware signatures at desktop and gateway level," the advisory issued to Internet users said.

Read Also:

5 Underdogs Who Turned Into Tech Icons

Falling Smartphone Prices In Emerging Markets To Drive 1 Bn Sales

Source: PTI