Ransomware
Ransomware é um tipo de software malicioso projetado para bloquear o acesso a um sistema de computador ou dados até que uma quantia de dinheiro (resgate) seja paga.
Ataques de ransomware normalmente envolvem a criptografia dos arquivos de uma vítima, tornando-os inacessíveis. Os invasores então exigem um resgate, geralmente em criptomoeda, pela chave de descriptografia. Esses ataques podem ter como alvo indivíduos, empresas e até mesmo infraestruturas críticas. A ascensão das criptomoedas facilitou o ransomware, pois fornece aos invasores um meio de receber pagamentos anonimamente, tornando difícil rastrear os fundos e identificar os perpetradores. Ransomware sofisticado geralmente inclui exfiltração de dados, onde os invasores roubam dados confidenciais antes de criptografá-los, ameaçando divulgar os dados publicamente se o resgate não for pago.
graph LR
Center["Ransomware"]:::main
Pre_cryptography["cryptography"]:::pre --> Center
click Pre_cryptography "/terms/cryptography"
Rel_distributed_denial_of_service_ddos["distributed-denial-of-service-ddos"]:::related -.-> Center
click Rel_distributed_denial_of_service_ddos "/terms/distributed-denial-of-service-ddos"
Rel_whale_crypto["whale-crypto"]:::related -.-> Center
click Rel_whale_crypto "/terms/whale-crypto"
Rel_encryption["encryption"]:::related -.-> Center
click Rel_encryption "/terms/encryption"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Explique como se eu tivesse 5 anos
Cofre trancado por resgate.
🤓 Expert Deep Dive
Ransomware operates by leveraging cryptographic primitives, most commonly symmetric [encryption](/pt/terms/symmetric-encryption) algorithms like AES for bulk data encryption, combined with asymmetric encryption (e.g., RSA) for securely exchanging the symmetric key. The initial infection vector is critical, often exploiting zero-day vulnerabilities or social engineering to bypass perimeter defenses and gain execution on endpoints. Post-execution, ransomware employs techniques to ensure persistence and evade detection, such as rootkit functionalities, disabling security services, and employing anti-debugging measures. Advanced variants exhibit polymorphic or metamorphic capabilities to evade signature-based detection. The economic model relies on the perceived value of the encrypted data and the victim's willingness to pay, often facilitated by the pseudonymous nature of cryptocurrencies like Bitcoin. The double and triple extortion models, involving data exfiltration and DDoS attacks, represent an escalation of tactics to increase leverage.