{"id":1834,"date":"2022-12-26T16:27:21","date_gmt":"2022-12-26T16:27:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1284"},"modified":"2022-12-26T16:27:21","modified_gmt":"2022-12-26T16:27:21","slug":"phan-mem-tong-tien","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/","title":{"rendered":"Ransomware: N\u00f3 l\u00e0 g\u00ec v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea1n"},"content":{"rendered":"<p>Ransomware is a type of malicious software or malware that virtually holds your data hostage, locking up your computer and threatening to keep it locked until you pay the attacker\u2019s ransom. The International Business Machines Corporation (IBM) reports that in 2021, ransomware attacks accounted for 21% of all cyberattacks and resulted in a staggering USD 20 billion loss.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-ransomware\">Ransomware l\u00e0 g\u00ec?<\/h2>\n\n\n<p>In the past, ransomware attacks were aimed solely at locking a person\u2019s data or device until they paid money to unlock it.&nbsp;<\/p>\n\n\n\n<p>Nowadays, however, cybercriminals are taking matters to a whole new level. The 2022 X-Force Threat Intelligence Index revealed that virtually all ransomware attacks have now adopted the \u2018double extortion\u2019 strategy, which not only locks data but also expects a ransom payment to prevent theft. In addition, these malicious cybercriminals are introducing an additional threat in their repertoire \u2013 triple extortion campaigns involving Distributed Denial of Service (DDoS) assaults \u2013 and they are becoming increasingly common.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-and-malware\">Ransomware v\u00e0 ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i <\/h2>\n\n\n<p>\u0110\u1ec3 hi\u1ec3u r\u00f5 h\u01a1n v\u1ec1 ransomware, tr\u01b0\u1edbc ti\u00ean ch\u00fang ta ph\u1ea3i xem x\u00e9t ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i (malicious software) l\u00e0 g\u00ec v\u00e0 t\u00e1c \u0111\u1ed9ng c\u1ee7a n\u00f3.<\/p>\n\n\n\n<p>Malware \u2013 a term that prompts more questions than answers. Is the malicious software, or is it simply being used for nefarious purposes? As with many aspects of cybersecurity, there\u2019s no single answer to this question; instead, it\u2019s an intricate and complex area in which we must consider multiple factors. The software can be malevolent in its own right; however, the human who operates said software is ultimately responsible for determining whether and how malicious it will be.<\/p>\n\n\n\n<p>Cyber threats are broad, from destructive viruses to crafty Trojans. But there\u2019s a unique strain even more dangerous than these \u2013 ransomware. Uncover the mystery behind this malicious software, and learn how to protect yourself from it!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-does-ransomware-work\">Ransomware ho\u1ea1t \u0111\u1ed9ng nh\u01b0 th\u1ebf n\u00e0o?<\/h2>\n\n\n<p>Ransomware is designed to lock access and all content within the target computer or network until its attacker receives payment. Even more sophisticated attacks may initiate disk-level encryption with such intensity that, without paying the ransom, it would be impossible to decrypt any files. From 2013 to 2020, the FBI\u2019s Internet Crime Complaint Center noticed a dramatic surge of 243% in reported ransomware occurrences.<\/p>\n\n\n\n<p>Kh\u00f4ng gi\u1ed1ng nh\u01b0 c\u00e1c h\u00ecnh th\u1ee9c t\u1ed9i ph\u1ea1m m\u1ea1ng kh\u00e1c, ransomware y\u00eau c\u1ea7u n\u1ea1n nh\u00e2n ph\u1ea3i h\u1ee3p t\u00e1c v\u1edbi t\u1ed9i ph\u1ea1m \u0111\u1ec3 l\u00e0m cho n\u00f3 th\u00e0nh c\u00f4ng.<\/p>\n\n\n\n<p>Nh\u01b0 \u0111\u00e3 n\u00eau tr\u00ean trang web c\u1ee7a h\u1ecd, FBI c\u1ea3nh b\u00e1o kh\u00f4ng n\u00ean tr\u1ea3 ti\u1ec1n chu\u1ed9c n\u1ebfu c\u00e1 nh\u00e2n ho\u1eb7c c\u00f4ng ty b\u1ecb t\u1ea5n c\u00f4ng b\u1eb1ng ransomware. B\u1eb1ng c\u00e1ch tr\u1ea3 ti\u1ec1n chu\u1ed9c, kh\u00f4ng c\u00f3 g\u00ec \u0111\u1ea3m b\u1ea3o r\u1eb1ng m\u1ed9t t\u1ed5 ch\u1ee9c ho\u1eb7c n\u1ea1n nh\u00e2n s\u1ebd l\u1ea5y l\u1ea1i quy\u1ec1n truy c\u1eadp v\u00e0o d\u1eef li\u1ec7u c\u1ee7a h\u1ecd, l\u00e0m cho n\u00f3 tr\u1edf th\u00e0nh m\u1ed9t gi\u1ea3i ph\u00e1p r\u1ee7i ro v\u00e0 kh\u00f4ng \u0111\u00e1ng tin c\u1eady. \u0110\u00e1ng bu\u1ed3n thay, trong m\u1ed9t s\u1ed1 tr\u01b0\u1eddng h\u1ee3p m\u00e0 n\u1ea1n nh\u00e2n \u0111\u00e3 tr\u1ea3 ti\u1ec1n chu\u1ed9c theo y\u00eau c\u1ea7u c\u1ee7a k\u1ebb t\u1ea5n c\u00f4ng, h\u1ecd v\u1eabn kh\u00f4ng bao gi\u1edd nh\u1eadn \u0111\u01b0\u1ee3c kh\u00f3a gi\u1ea3i m\u00e3 h\u1ee3p ph\u00e1p \u0111\u1ec3 m\u1edf kh\u00f3a d\u1eef li\u1ec7u c\u1ee7a m\u00ecnh. Ngay c\u1ea3 khi h\u1ecd nh\u1eadn \u0111\u01b0\u1ee3c m\u1ed9t kh\u00f3a, c\u00f3 th\u1ec3 kh\u00f4ng ph\u1ea3i t\u1ea5t c\u1ea3 c\u00e1c t\u1ec7p \u0111\u1ec1u c\u00f3 th\u1ec3 kh\u00f4i ph\u1ee5c \u0111\u01b0\u1ee3c. B\u1eb1ng c\u00e1ch tr\u1ea3 ti\u1ec1n chu\u1ed9c, kh\u00f4ng ch\u1ec9 b\u1ea1n \u0111ang cung c\u1ea5p \u0111\u1ed9ng l\u1ef1c cho t\u1ed9i ph\u1ea1m ti\u1ebfp t\u1ee5c th\u1ef1c hi\u1ec7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware v\u00e0o c\u00e1c t\u1ed5 ch\u1ee9c v\u00e0 c\u00e1 nh\u00e2n, m\u00e0 b\u1ea1n c\u00f2n l\u00e0m cho n\u00f3 tr\u1edf n\u00ean h\u1ea5p d\u1eabn h\u01a1n \u0111\u1ed1i v\u1edbi c\u00e1c t\u1ed9i ph\u1ea1m m\u1ea1ng ti\u1ec1m n\u0103ng kh\u00e1c.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"popular-ransomware-variations\"><strong>C\u00e1c bi\u1ebfn th\u1ec3 ransomware ph\u1ed5 bi\u1ebfn<\/strong><\/h3>\n\n\n<p>With numerous ransomware varieties existing, it is no wonder that some are more successful than others. In fact, there are a select few who have risen above the rest in terms of effectiveness and popularity \u2013 making them stand out from their counterparts.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"1-ryuk\"><strong>1. Ryuk<\/strong><\/h3>\n\n\n<p>Ryuk is a type of ransomware that targets a specific type of user. It is usually delivered through an email or someone\u2019s login information to get into a system. Once the system is infected, Ryuk encrypts some files and then asks for money to give them back.<\/p>\n\n\n\n<p>Ryuk n\u1ed5i ti\u1ebfng l\u00e0 m\u1ed9t trong nh\u1eefng lo\u1ea1i ransomware t\u1ed1n k\u00e9m nh\u1ea5t, v\u1edbi y\u00eau c\u1ea7u ti\u1ec1n chu\u1ed9c trung b\u00ecnh v\u01b0\u1ee3t qu\u00e1 1 tri\u1ec7u \u0111\u00f4 la. V\u00ec l\u00fd do n\u00e0y, t\u1ed9i ph\u1ea1m m\u1ea1ng li\u00ean quan \u0111\u1ebfn Ryuk th\u01b0\u1eddng xuy\u00ean nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c doanh nghi\u1ec7p c\u00f3 kh\u1ea3 n\u0103ng t\u00e0i ch\u00ednh d\u1ed3i d\u00e0o \u0111\u1ec3 \u0111\u00e1p \u1ee9ng c\u00e1c kho\u1ea3n thanh to\u00e1n cao ng\u1ea5t ng\u01b0\u1edfng n\u00e0y.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2revilnbspsodinokibi\"><strong>2. REvil (Sodinokibi)<\/strong><\/h3>\n\n\n<p>REvil (c\u00f2n \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 Sodinokibi) l\u00e0 m\u1ed9t bi\u1ebfn th\u1ec3 ransomware \u0111\u1ed9c h\u1ea1i ch\u1ee7 y\u1ebfu g\u00e2y phi\u1ec1n to\u00e1i cho c\u00e1c c\u00f4ng ty l\u1edbn.<\/p>\n\n\n\n<p>Infamous REvil ransomware, operated by the Russian-speaking group since 2019, is one of the most notorious cyber threats on the internet today. For example, they have been held responsible for significant breaches such as \u2018Kaseya\u2019 and \u2018JBS\u2019, making them a serious threat to businesses across numerous industries.<\/p>\n\n\n\n<p>Trong v\u00e0i n\u0103m qua, REvil \u0111\u00e3 \u0111\u1ed1i \u0111\u1ea7u v\u1edbi Ryuk \u0111\u1ec3 gi\u00e0nh danh hi\u1ec7u ransomware t\u1ed1n k\u00e9m nh\u1ea5t. C\u00f3 b\u00e1o c\u00e1o cho r\u1eb1ng ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i n\u00e0y \u0111\u00e3 y\u00eau c\u1ea7u thanh to\u00e1n ti\u1ec1n chu\u1ed9c l\u00ean \u0111\u1ebfn 800,000 \u0111\u00f4 la.<\/p>\n\n\n\n<p>Initially, REvil was just another traditional ransomware variant, yet it has since progressed. Presently, they use the Double Extortion technique \u2013 not only encrypting files but also stealing data from businesses. This means that apart from requesting a ransom to decrypt data, attackers will threaten to publicly expose the stolen information if an additional payment is not rendered.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3nbspmaze\"><strong>3. Maze<\/strong><\/h3>\n\n\n<p>The Maze ransomware has gained notoriety for its innovative approach to extortion. It not only encrypts files but also steals sensitive data from the victim\u2019s computer and threatens to make it public or sell it if a ransom is not paid. This menacing strategy puts targets in an even more difficult situation \u2013 either pay up or face much higher costs due to an expensive data breach.<\/p>\n\n\n\n<p>Although the Maze ransomware group has disbanded, this does not signify that ransomware threats are now obsolete. Several former affiliates of Maze have shifted to using Egregor ransomware instead, and it is widely speculated that these three variants \u2013 Sekhmet being the third \u2013 share an identical originator.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-dearcry\"><strong>4. DearCry<\/strong><\/h3>\n\n\n<p>V\u00e0o th\u00e1ng 3 n\u0103m 2021, Microsoft \u0111\u00e3 ph\u00e1t h\u00e0nh c\u00e1c b\u1ea3n c\u1eadp nh\u1eadt quan tr\u1ecdng cho b\u1ed1n l\u1ed7 h\u1ed5ng trong m\u00e1y ch\u1ee7 Exchange c\u1ee7a h\u1ecd, nh\u01b0ng tr\u01b0\u1edbc khi m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 \u00e1p d\u1ee5ng c\u00e1c b\u1ea3n v\u00e1 \u0111\u1ec3 b\u1ea3o v\u1ec7 m\u00ecnh kh\u1ecfi nguy hi\u1ec3m ti\u1ec1m t\u00e0ng; DearCry \u0111\u00e3 xu\u1ea5t hi\u1ec7n v\u1edbi m\u1ed9t bi\u1ebfn th\u1ec3 ransomware m\u1edbi \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1eb7c bi\u1ec7t \u0111\u1ec3 khai th\u00e1c nh\u1eefng \u0111i\u1ec3m y\u1ebfu n\u00e0y.<\/p>\n\n\n\n<p>Ransomware DearCry c\u00f3 th\u1ec3 kh\u00f3a nhi\u1ec1u t\u1ec7p, \u0111\u1ec3 l\u1ea1i cho ng\u01b0\u1eddi d\u00f9ng m\u1ed9t th\u00f4ng b\u00e1o ti\u1ec1n chu\u1ed9c tr\u00ean m\u00e1y t\u00ednh c\u1ee7a h\u1ecd h\u01b0\u1edbng d\u1eabn h\u1ecd li\u00ean h\u1ec7 v\u1edbi nh\u00e0 \u0111i\u1ec1u h\u00e0nh \u0111\u1ec3 bi\u1ebft c\u00e1ch kh\u00f4i ph\u1ee5c quy\u1ec1n truy c\u1eadp.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-lapsus\"><strong>5. Lapsus$<\/strong><\/h3>\n\n\n<p>The South American ransomware gang, Lapsus$, has been linked to cyberattacks on noteworthy targets worldwide. With intimidation and the potential for sensitive data exposure, the cyber gang has established a name for itself by extorting its victims unless their demands are met. They have bragged about penetrating Nvidia, Samsung, and Ubisoft, amongst other global organizations.\u00a0This group utilises pilfered source code to make malicious files appear as legitimate software.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"6-lockbit\"><strong>6. Lockbit<\/strong><\/h3>\n\n\n<p>LockBit l\u00e0 ph\u1ea7n m\u1ec1m \u0111\u01b0\u1ee3c t\u1ea1o ra \u0111\u1ec3 ng\u0103n ng\u01b0\u1eddi kh\u00e1c truy c\u1eadp d\u1eef li\u1ec7u. N\u00f3 \u0111\u00e3 t\u1ed3n t\u1ea1i t\u1eeb th\u00e1ng 9 n\u0103m 2019. G\u1ea7n \u0111\u00e2y, n\u00f3 \u0111\u00e3 tr\u1edf th\u00e0nh m\u1ed9t D\u1ecbch v\u1ee5 Ransomware (RaaS). \u0110i\u1ec1u n\u00e0y c\u00f3 ngh\u0129a l\u00e0 m\u1ecdi ng\u01b0\u1eddi c\u00f3 th\u1ec3 tr\u1ea3 ti\u1ec1n \u0111\u1ec3 s\u1eed d\u1ee5ng n\u00f3 \u0111\u1ec3 ng\u0103n ng\u01b0\u1eddi kh\u00e1c truy c\u1eadp d\u1eef li\u1ec7u c\u1ee7a h\u1ecd.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-costly-consequencesnbsp\">H\u1eadu qu\u1ea3 t\u1ed1n k\u00e9m c\u1ee7a ransomware <\/h2>\n\n\n<p>People dealing with ransomware are often reticent to admit the amount of ransom they have paid. As outlined in the report Definitive Guide to Ransomware 2022, ransom demands have increased drastically; what used to comprise only single-digit payments has now expanded into seven and eight-digit figures. In the most extreme instances, companies may need to pay a hefty ransom of USD 40-80 million for their data to be returned. Yet these payments aren\u2019t the only cost associated with ransomware attacks; other direct and indirect costs can compound an organization\u2019s financial burden. As reported in IBM\u2019s Cost of Data Breach 2021 study, the standard cost of ransomware attacks without including ransom payments amounted to a staggering USD 4.62 million on average.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"the-dch-hospitals-case\">Tr\u01b0\u1eddng h\u1ee3p c\u1ee7a B\u1ec7nh vi\u1ec7n DCH<\/h3>\n\n\n<p>DCH l\u00e0 m\u1ed9t trung t\u00e2m y t\u1ebf khu v\u1ef1c \u1edf Tuscaloosa, Alabama, ho\u1ea1t \u0111\u1ed9ng t\u1eeb n\u0103m 1923.<\/p>\n\n\n\n<p>On October 1st, 2019, DCH Hospitals got attacked by ransomware. Everything electronic was down. They couldn\u2019t take any new patients and had to use all paper for everything.<\/p>\n\n\n\n<p>M\u1ed9t \u0111\u1ea1i di\u1ec7n t\u1eeb DCH ti\u1ebft l\u1ed9 r\u1eb1ng h\u1ec7 th\u1ed1ng \u0111\u00e3 b\u1ecb x\u00e2m ph\u1ea1m khi ai \u0111\u00f3 m\u1edf v\u00e0 t\u01b0\u01a1ng t\u00e1c v\u1edbi m\u1ed9t t\u1ec7p \u0111\u00ednh k\u00e8m email b\u1ecb h\u1ecfng. May m\u1eafn thay, kh\u00f4ng c\u00f3 th\u00f4ng tin b\u1ec7nh nh\u00e2n n\u00e0o b\u1ecb \u0111e d\u1ecda.<\/p>\n\n\n\n<p>H\u1ec7 th\u1ed1ng B\u1ec7nh vi\u1ec7n DCH t\u1ef1 h\u00e0o c\u00f3 ba b\u1ec7nh vi\u1ec7n l\u1edbn \u2014 Trung t\u00e2m Y t\u1ebf Khu v\u1ef1c DCH, Trung t\u00e2m Y t\u1ebf Northport v\u00e0 Trung t\u00e2m Y t\u1ebf Fayette \u2014 ph\u1ee5c v\u1ee5 m\u1ed9t ph\u1ea7n l\u1edbn c\u1ee7a T\u00e2y Alabama. Ba c\u01a1 s\u1edf y t\u1ebf n\u00e0y cung c\u1ea5p h\u01a1n 850 gi\u01b0\u1eddng v\u00e0 \u0111\u00f3n h\u01a1n 32,000 b\u1ec7nh nh\u00e2n h\u00e0ng n\u0103m.<\/p>\n\n\n\n<p>V\u00e0o th\u1ee9 B\u1ea3y, ng\u00e0y 5 th\u00e1ng 10, \u0111\u1ec3 nhanh ch\u00f3ng l\u1ea5y l\u1ea1i quy\u1ec1n truy c\u1eadp v\u00e0o h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd, B\u1ec7nh vi\u1ec7n DCH \u0111\u00e3 ch\u1ecdn tr\u1ea3 ti\u1ec1n chu\u1ed9c v\u00e0 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 t\u1eeb k\u1ebb t\u1ea5n c\u00f4ng. Tuy nhi\u00ean, h\u1ecd \u0111\u00e3 quy\u1ebft \u0111\u1ecbnh kh\u00f4ng ti\u1ebft l\u1ed9 s\u1ed1 ti\u1ec1n \u0111\u00e3 tr\u1ea3. V\u00ec c\u00e1c h\u1ec7 th\u1ed1ng ch\u0103m s\u00f3c s\u1ee9c kh\u1ecfe l\u00e0 quan tr\u1ecdng v\u00e0 nh\u1ea1y c\u1ea3m, ch\u00fang tr\u1edf th\u00e0nh m\u1ee5c ti\u00eau d\u1ec5 d\u00e0ng cho c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware. Th\u01b0\u1eddng th\u00ec c\u00e1c t\u1ed5 ch\u1ee9c n\u00e0y th\u1ea5y vi\u1ec7c tr\u1ea3 ti\u1ec1n chu\u1ed9c c\u00f3 l\u1ee3i h\u01a1n l\u00e0 \u0111\u1ed1i m\u1eb7t v\u1edbi kh\u1ea3 n\u0103ng m\u1ea5t d\u1eef li\u1ec7u ho\u1eb7c gi\u00e1n \u0111o\u1ea1n. Th\u00f4ng tin b\u00ed m\u1eadt \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef trong h\u1ec7 th\u1ed1ng c\u1ee7a h\u1ecd qu\u00e1 qu\u00fd gi\u00e1 \u0111\u1ec3 m\u1ea5t. Ransomware \u0111\u1ed9c h\u1ea1i \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng \u0111\u1ec3 x\u00e2m nh\u1eadp b\u1ea3o m\u1eadt c\u1ee7a B\u1ec7nh vi\u1ec7n DCH \u0111\u00e3 \u0111\u01b0\u1ee3c m\u1ed9t nh\u00e2n vi\u00ean v\u00f4 t\u00ecnh t\u1ea1o \u0111i\u1ec1u ki\u1ec7n b\u1eb1ng c\u00e1ch m\u1edf m\u1ed9t email l\u1eeba \u0111\u1ea3o ch\u1ee9a t\u1ec7p \u0111\u00ednh k\u00e8m b\u1ecb nhi\u1ec5m. \u0110i\u1ec1u n\u00e0y cho ph\u00e9p ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i truy c\u1eadp v\u00e0 sau \u0111\u00f3 l\u00e2y nhi\u1ec5m v\u00e0o m\u1ea1ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"5-steps-to-prevent-becoming-a-ransomware-victim\">5 b\u01b0\u1edbc \u0111\u1ec3 ng\u0103n ch\u1eb7n tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n c\u1ee7a ransomware<\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"1-train-your-employees-about-cybersecurity-threatsnbsp\">1. \u0110\u00e0o t\u1ea1o nh\u00e2n vi\u00ean c\u1ee7a b\u1ea1n v\u1ec1 c\u00e1c m\u1ed1i \u0111e d\u1ecda an ninh m\u1ea1ng. <\/h3>\n\n\n<p>\u0110\u1ec3 b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng m\u1ea1ng v\u00e0 c\u00f3 th\u1ec3 nh\u1eadn di\u1ec7n s\u1ef1 xu\u1ea5t hi\u1ec7n c\u1ee7a ch\u00fang t\u1ea1i n\u01a1i l\u00e0m vi\u1ec7c, ch\u00fang ta ph\u1ea3i th\u1eeba nh\u1eadn tr\u00e1ch nhi\u1ec7m c\u00e1 nh\u00e2n c\u1ee7a m\u00ecnh \u0111\u1ed1i v\u1edbi an ninh m\u1ea1ng. M\u1ed7i nh\u00e2n vi\u00ean n\u00ean nh\u1eadn \u0111\u01b0\u1ee3c \u0111\u00e0o t\u1ea1o chuy\u00ean bi\u1ec7t v\u1ec1 vi\u1ec7c nh\u1eadn di\u1ec7n v\u00e0 ng\u0103n ch\u1eb7n c\u00e1c m\u1ed1i \u0111e d\u1ecda kh\u00f4ng gian m\u1ea1ng. Nh\u01b0ng cu\u1ed1i c\u00f9ng, m\u1ed7i c\u00e1 nh\u00e2n ph\u1ea3i t\u1ef1 m\u00ecnh \u0111\u00e1nh gi\u00e1 c\u00e1c r\u1ee7i ro ti\u1ec1m \u1ea9n trong cu\u1ed9c s\u1ed1ng h\u00e0ng ng\u00e0y c\u1ee7a m\u00ecnh. S\u1ef1 c\u1ed1 t\u1ea1i B\u1ec7nh vi\u1ec7n DCH l\u00e0 m\u1ed9t v\u00ed d\u1ee5 quan tr\u1ecdng v\u1ec1 gi\u00e1 tr\u1ecb c\u1ee7a vi\u1ec7c c\u00f3 hi\u1ec3u bi\u1ebft c\u00e1 nh\u00e2n v\u1ec1 an ninh m\u1ea1ng.<\/p>\n\n\n\n<p>The company must inform the employee of the potential risks of opening email attachments from unknown senders, particularly in a work environment. When in doubt, it\u2019s always best to consult someone with experience before opening any messages, links or attachments. Many businesses have an in-house IT department that will take any reports concerning a phishing attempt to confirm if it is legitimate to the employee. If the message comes from a reliable source like your bank account provider or acquaintances you know personally, contact them directly and confirm that they sent the message and its contents before clicking on any links provided. This way, you can protect yourself from potential cyber-attacks.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"2-back-up-your-files\">2. Sao l\u01b0u t\u1ec7p c\u1ee7a b\u1ea1n.<\/h3>\n\n\n<p>If you\u2019re ever targeted by ransomware or have some data lost in an attack and don\u2019t want to pay the ransom, having a secure backup of your most valuable information is essential.<\/p>\n\n\n\n<p>\u0110\u1ec3 gi\u1ea3m thi\u1ec3u h\u1eadu qu\u1ea3 c\u1ee7a m\u1ed9t cu\u1ed9c t\u1ea5n c\u00f4ng \u0111\u1ed9c h\u1ea1i, B\u1ec7nh vi\u1ec7n DCH n\u00ean th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p ph\u00f2ng ng\u1eeba v\u00e0 sao l\u01b0u c\u00e1c t\u1ec7p quan tr\u1ecdng c\u1ee7a h\u1ecd tr\u01b0\u1edbc khi s\u1ef1 c\u1ed1 x\u1ea3y ra. M\u1ed9t b\u1ea3n sao l\u01b0u s\u1ebd cho ph\u00e9p h\u1ecd ti\u1ebfp t\u1ee5c ho\u1ea1t \u0111\u1ed9ng m\u00e0 kh\u00f4ng b\u1ecb gi\u00e1n \u0111o\u1ea1n do ransomware.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"3-keep-your-software-updated\">3. Gi\u1eef ph\u1ea7n m\u1ec1m c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt.<\/h3>\n\n\n<p>T\u1ed9i ph\u1ea1m m\u1ea1ng th\u01b0\u1eddng xuy\u00ean l\u1ee3i d\u1ee5ng c\u00e1c \u0111i\u1ec3m y\u1ebfu hi\u1ec7n c\u00f3 \u0111\u1ec3 \u0111\u01b0a ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i v\u00e0o thi\u1ebft b\u1ecb ho\u1eb7c h\u1ec7 th\u1ed1ng. C\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt ch\u01b0a \u0111\u01b0\u1ee3c v\u00e1, ho\u1eb7c zero-day, c\u00f3 th\u1ec3 r\u1ea5t nguy hi\u1ec3m v\u00ec ch\u00fang ho\u1eb7c ch\u01b0a \u0111\u01b0\u1ee3c bi\u1ebft \u0111\u1ebfn trong ng\u00e0nh an to\u00e0n k\u1ef9 thu\u1eadt s\u1ed1 ho\u1eb7c \u0111\u00e3 \u0111\u01b0\u1ee3c x\u00e1c \u0111\u1ecbnh nh\u01b0ng ch\u01b0a \u0111\u01b0\u1ee3c gi\u1ea3i quy\u1ebft. M\u1ed9t s\u1ed1 nh\u00f3m ransomware \u0111\u00e3 \u0111\u01b0\u1ee3c quan s\u00e1t mua th\u00f4ng tin t\u00ecnh b\u00e1o v\u1ec1 c\u00e1c l\u1ed7 h\u1ed5ng zero-day t\u1eeb t\u1ed9i ph\u1ea1m m\u1ea1ng, m\u00e0 h\u1ecd s\u1eed d\u1ee5ng cho c\u00e1c ho\u1ea1t \u0111\u1ed9ng \u0111\u1ed9c h\u1ea1i c\u1ee7a m\u00ecnh. C\u0169ng \u0111\u01b0\u1ee3c bi\u1ebft r\u1eb1ng hacker c\u00f3 th\u1ec3 s\u1eed d\u1ee5ng c\u00e1c l\u1ed7 h\u1ed5ng b\u1ea3o m\u1eadt \u0111\u00e3 \u0111\u01b0\u1ee3c v\u00e1 \u0111\u1ec3 x\u00e2m nh\u1eadp h\u1ec7 th\u1ed1ng v\u00e0 th\u1ef1c hi\u1ec7n c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng.&nbsp;<\/p>\n\n\n\n<p>\u0110i\u1ec1u c\u1ea7n thi\u1ebft l\u00e0 \u00e1p d\u1ee5ng c\u00e1c b\u1ea3n v\u00e1 th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 b\u1ea3o v\u1ec7 ch\u1ed1ng l\u1ea1i c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware nh\u1eafm v\u00e0o c\u00e1c l\u1ed7 h\u1ed5ng ph\u1ea7n m\u1ec1m v\u00e0 h\u1ec7 \u0111i\u1ec1u h\u00e0nh.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"4-install-and-update-cybersecurity-tools\">4. C\u00e0i \u0111\u1eb7t v\u00e0 c\u1eadp nh\u1eadt c\u00e1c c\u00f4ng c\u1ee5 an ninh m\u1ea1ng<\/h3>\n\n\n<p>It\u2019s essential to upgrade cybersecurity tools \u2013 anti-malware and antivirus software, firewalls, secure web gateways, as well as enterprise solutions such as endpoint detection and response (EDR), extended detection and response (XDR), which can help security teams detect malicious activity in real-time.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"5-implement-access-control-policies\">5. Th\u1ef1c hi\u1ec7n c\u00e1c ch\u00ednh s\u00e1ch ki\u1ec3m so\u00e1t truy c\u1eadp<\/h3>\n\n\n<p>C\u00e1c t\u1ed5 ch\u1ee9c n\u00ean tri\u1ec3n khai x\u00e1c th\u1ef1c \u0111a y\u1ebfu t\u1ed1, ki\u1ebfn tr\u00fac kh\u00f4ng tin t\u01b0\u1edfng, ph\u00e2n \u0111o\u1ea1n m\u1ea1ng v\u00e0 c\u00e1c bi\u1ec7n ph\u00e1p b\u1ea3o v\u1ec7 li\u00ean quan \u0111\u1ec3 b\u1ea3o v\u1ec7 d\u1eef li\u1ec7u d\u1ec5 b\u1ecb t\u1ed5n th\u01b0\u01a1ng v\u00e0 ng\u0103n ch\u1eb7n s\u00e2u m\u00e3 h\u00f3a di chuy\u1ec3n \u0111\u1ebfn c\u00e1c m\u00e1y kh\u00e1c trong m\u1ea1ng.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ransomware-targets-individuals-as-well\">Ransomware c\u0169ng nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1 nh\u00e2n.<\/h2>\n\n\n<p>Generally, ransomware stories focus on the aftermath of corporate or healthcare system hacks; however, it is essential to recognize that individuals are not immune from these attacks. In fact, they occur more often than you may think. Individuals must be aware of ransomware\u2019s genuine danger when using the internet, as it could risk their safety and security.<\/p>\n\n\n\n<p>T\u1ed9i ph\u1ea1m m\u1ea1ng s\u1eed d\u1ee5ng hai ph\u01b0\u01a1ng ph\u00e1p ch\u00ednh khi tri\u1ec3n khai ransomware: m\u00e3 h\u00f3a v\u00e0 kh\u00f3a m\u00e0n h\u00ecnh.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"encryption-ransomware\">Ransomware m\u00e3 h\u00f3a<\/h3>\n\n\n<p>T\u1ed9i ph\u1ea1m m\u1ea1ng ch\u1ee7 y\u1ebfu nh\u1eafm m\u1ee5c ti\u00eau v\u00e0o c\u00e1c t\u1ec7p c\u1ee5 th\u1ec3 \u0111\u01b0\u1ee3c l\u01b0u tr\u1eef c\u1ee5c b\u1ed9 tr\u00ean thi\u1ebft b\u1ecb th\u00f4ng qua ransomware m\u00e3 h\u00f3a. \u0110\u1ec3 ch\u1ecdn ra c\u00e1c t\u00e0i li\u1ec7u n\u00e0y, k\u1ebb t\u1ea5n c\u00f4ng s\u1eed d\u1ee5ng c\u00e1c th\u1ee7 \u0111o\u1ea1n l\u1eeba \u0111\u1ea3o ho\u1eb7c c\u00e1c h\u00ecnh th\u1ee9c ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i kh\u00e1c \u0111\u1ec3 \u0111i\u1ec1u tra m\u1ee5c ti\u00eau c\u1ee7a h\u1ecd. Khi c\u00e1c t\u1ec7p \u0111\u00e3 \u0111\u01b0\u1ee3c m\u00e3 h\u00f3a, n\u1ea1n nh\u00e2n s\u1ebd b\u1ecb y\u00eau c\u1ea7u tr\u1ea3 ti\u1ec1n chu\u1ed9c \u0111\u1ec3 nh\u1eadn kh\u00f3a gi\u1ea3i m\u00e3 c\u1ea7n thi\u1ebft \u0111\u1ec3 truy c\u1eadp d\u1eef li\u1ec7u c\u1ee7a h\u1ecd. Hacker th\u01b0\u1eddng s\u1eed d\u1ee5ng chi\u1ebfn l\u01b0\u1ee3c n\u00e0y \u0111\u1ec3 truy c\u1eadp th\u00f4ng tin b\u00ed m\u1eadt ho\u1eb7c nh\u1ea1y c\u1ea3m m\u00e0 c\u00e1c c\u00f4ng ty \u0111ang c\u1ed1 g\u1eafng b\u1ea3o v\u1ec7. C\u00e1ch ti\u1ebfp c\u1eadn n\u00e0y \u0111\u00e3 tr\u1edf n\u00ean ph\u1ed5 bi\u1ebfn trong s\u1ed1 c\u00e1c b\u00ean \u0111\u1ed9c h\u1ea1i, l\u00e0m cho c\u00e1c doanh nghi\u1ec7p v\u00e0 t\u1ed5 ch\u1ee9c tr\u1edf th\u00e0nh m\u1ee5c ti\u00eau ph\u1ed5 bi\u1ebfn.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lock-screen-ransomware\">Ransomware kh\u00f3a m\u00e0n h\u00ecnh<\/h3>\n\n\n<p>Conversely, lock screen ransomware encrypts specific files and renders a user\u2019s device completely inoperable. Locking-screen ransomware will lock up your device and display a full-screen message that is unmovable and unminimizable. You\u2019ll be asked to pay a ransom to unlock the system or retrieve lost data or files.<\/p>\n\n\n\n<p>These programs often employ fear tactics to pressure you into making payments, such as a ticking clock that warns it will delete all your files if time runs out. Cyber attackers often attempt to intimidate individuals by fabricating stories about their devices being linked with illegal activities or inappropriate material and threatening to report them to the authorities if the victim doesn\u2019t pay. To further coerce victims into paying the ransom, some ransomware developers leverage pornographic imagery and threaten that the victim cannot remove it without payment.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"ultimately\">Cu\u1ed1i c\u00f9ng<\/h2>\n\n\n<p>Th\u1ef1c hi\u1ec7n c\u00e1c bi\u1ec7n ph\u00e1p an ninh m\u1ea1ng hi\u1ec7u qu\u1ea3, ch\u1eb3ng h\u1ea1n nh\u01b0 th\u01b0\u1eddng xuy\u00ean c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m v\u00e0 c\u00f4ng c\u1ee5 b\u1ea3o m\u1eadt c\u1ee7a b\u1ea1n, th\u1ef1c thi c\u00e1c ch\u00ednh s\u00e1ch ki\u1ec3m so\u00e1t truy c\u1eadp v\u00e0 nh\u1eadn th\u1ee9c v\u1ec1 c\u00e1c chi\u1ebfn thu\u1eadt kh\u00e1c nhau \u0111\u01b0\u1ee3c s\u1eed d\u1ee5ng b\u1edfi c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh \u0111\u1ed9c h\u1ea1i n\u00e0y \u0111\u1ec3 b\u1ea3o v\u1ec7 doanh nghi\u1ec7p c\u1ee7a b\u1ea1n kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware. Ngo\u00e0i ra, c\u00e1c c\u00e1 nh\u00e2n n\u00ean th\u1ef1c hi\u1ec7n c\u00e1c b\u01b0\u1edbc ch\u1ee7 \u0111\u1ed9ng \u0111\u1ec3 b\u1ea3o v\u1ec7 thi\u1ebft b\u1ecb c\u1ee7a h\u1ecd kh\u1ecfi c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng ransomware \u2013 bao g\u1ed3m c\u1ea9n th\u1eadn khi m\u1edf email ho\u1eb7c nh\u1ea5p v\u00e0o li\u00ean k\u1ebft t\u1eeb c\u00e1c ngu\u1ed3n kh\u00f4ng r\u00f5. V\u1edbi nh\u1eadn th\u1ee9c v\u00e0 th\u1ef1c h\u00e0nh th\u1eadn tr\u1ecdng, t\u1ea5t c\u1ea3 ch\u00fang ta c\u00f3 th\u1ec3 gi\u00fap gi\u1ea3m thi\u1ec3u m\u1ed1i \u0111e d\u1ecda c\u1ee7a ransomware trong th\u1ebf gi\u1edbi k\u1ef9 thu\u1eadt s\u1ed1 c\u1ee7a ch\u00fang ta.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ph\u1ea7n m\u1ec1m t\u1ed1ng ti\u1ec1n l\u00e0 m\u1ed9t lo\u1ea1i ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i ho\u1eb7c ph\u1ea7n m\u1ec1m \u0111\u1ed9c h\u1ea1i th\u1ef1c t\u1ebf s\u1ebd gi\u1eef d\u1eef li\u1ec7u c\u1ee7a b\u1ea1n l\u00e0m con tin, kh\u00f3a m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 \u0111e d\u1ecda s\u1ebd ti\u1ebfp t\u1ee5c kh\u00f3a cho \u0111\u1ebfn khi b\u1ea1n tr\u1ea3 ti\u1ec1n cho k\u1ebb t\u1ea5n c\u00f4ng\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/\">Ti\u1ebfp t\u1ee5c \u0111\u1ecdc <span class=\"screen-reader-text\">Ransomware: N\u00f3 l\u00e0 g\u00ec v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea1n<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1286,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-1834","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware: What it is And How To Protect Yourself<\/title>\n<meta name=\"description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/\" \/>\n<meta property=\"og:locale\" content=\"vi_VN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware: What it is And How To Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-26T16:27:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"626\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 ph\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Ransomware: What it is And How To Protect Yourself\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"},\"wordCount\":2305,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"vi\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\",\"name\":\"Ransomware: What it is And How To Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"datePublished\":\"2022-12-26T16:27:21+00:00\",\"description\":\"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\"},\"inLanguage\":\"vi\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg\",\"width\":1000,\"height\":626,\"caption\":\"Ransomware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware: What it is And How To Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"vi\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"vi\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/vi\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware: N\u00f3 l\u00e0 g\u00ec v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea1n","description":"T\u00ecm hi\u1ec3u m\u1ecdi th\u1ee9 b\u1ea1n c\u1ea7n bi\u1ebft v\u1ec1 ransomware, c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi n\u00f3, v\u00e0 ph\u1ea3i l\u00e0m g\u00ec n\u1ebfu b\u1ea1n tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/","og_locale":"vi_VN","og_type":"article","og_title":"Ransomware: What it is And How To Protect Yourself","og_description":"Learn everything you need to know about ransomware, how to protect yourself from it, and what to do if you become a victim.","og_url":"https:\/\/securitybriefing.net\/vi\/cac-cuoc-tan-cong-mang\/phan-mem-tong-tien\/","og_site_name":"Security Briefing","article_published_time":"2022-12-26T16:27:21+00:00","og_image":[{"width":1000,"height":626,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"\u0110\u01b0\u1ee3c vi\u1ebft b\u1edfi":"security","\u01af\u1edbc t\u00ednh th\u1eddi gian \u0111\u1ecdc":"11 ph\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Ransomware: What it is And How To Protect Yourself","datePublished":"2022-12-26T16:27:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"},"wordCount":2305,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","articleSection":["Cyber Attacks"],"inLanguage":"vi"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/","name":"Ransomware: N\u00f3 l\u00e0 g\u00ec v\u00e0 c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea1n","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","datePublished":"2022-12-26T16:27:21+00:00","description":"T\u00ecm hi\u1ec3u m\u1ecdi th\u1ee9 b\u1ea1n c\u1ea7n bi\u1ebft v\u1ec1 ransomware, c\u00e1ch b\u1ea3o v\u1ec7 b\u1ea3n th\u00e2n kh\u1ecfi n\u00f3, v\u00e0 ph\u1ea3i l\u00e0m g\u00ec n\u1ebfu b\u1ea1n tr\u1edf th\u00e0nh n\u1ea1n nh\u00e2n.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb"},"inLanguage":"vi","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/12\/Ransomware-min-1.jpg","width":1000,"height":626,"caption":"Ransomware"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Ransomware: What it is And How To Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"B\u00e1o C\u00e1o An Ninh","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"vi"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"B\u00e1o C\u00e1o An Ninh","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"b\u1ea3o v\u1ec7","image":{"@type":"ImageObject","inLanguage":"vi","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin l\u00e0 m\u1ed9t bi\u00ean t\u1eadp vi\u00ean c\u1ea5p cao c\u1ee7a Government Technology. Tr\u01b0\u1edbc \u0111\u00e2y c\u00f4 \u0111\u00e3 vi\u1ebft cho PYMNTS v\u00e0 The Bay State Banner, v\u00e0 c\u00f3 b\u1eb1ng C\u1eed nh\u00e2n Ngh\u1ec7 thu\u1eadt s\u00e1ng t\u00e1c c\u1ee7a tr\u01b0\u1eddng Carnegie Mellon. C\u00f4 s\u1ed1ng \u1edf ngo\u1ea1i \u00f4 Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/vi\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1834","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/comments?post=1834"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/posts\/1834\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media\/1286"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/media?parent=1834"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/categories?post=1834"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/vi\/wp-json\/wp\/v2\/tags?post=1834"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}