Close Menu
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram Pinterest Vimeo
InfovistarInfovistar
  • AI & ML
  • Cybersecurity
  • Startup
  • Tech News
  • Insights
    • Web Development
    • AWS and Cloud
    • Blockchain and Cryptocurrency
    • Chatbots
    • Technology
    • DevOps
    • Resources
  • Courses
    • Machine Learning
      • Python Tutorial
      • TensorFlow Tutorial
      • OpenCV
    • DSA
      • Data Structures
    • Web Development
      • PHP Tutorial
      • CodeIgniter Tutorial
      • CodeIgniter 4 Tutorial
      • CodeIgniter 4 AJAX
      • JavaScript
    • Mobile Development
      • Android Tutorial
  • Tools
    • Beautifier
      • HTML Beautifier
      • JavaScript Beautifier
      • CSS Beautifier
    • Online Compilers
      • Python Compiler
      • Java Compiler
      • JavaScript Editor
      • PHP Compiler
      • C++ Compiler
      • C Compiler
    • Image Optimization
      • Image Compressor
      • JPEG to PNG
      • PNG to JPEG
      • WebP to PNG
Subscribe
InfovistarInfovistar
Home » Ransomware can hide in your Websites: Danger of Uploading Files
Cybersecurity

Ransomware can hide in your Websites: Danger of Uploading Files

InfovistarBy InfovistarMarch 21, 2024Updated:December 10, 2024No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Ransomware can hide your Websites The Hidden Danger of Uploading Files
Share
Facebook Twitter LinkedIn Pinterest Email

Researchers at Florida International University (FIU) cybersecurity warn that websites that ask for access to your data may be able to evade antivirus protection and launch large-scale ransomware attacks.

According to a study published by the Florida Institute of Innovation and Industry (FIU), free photo editors and tax document assistants, as well as other online applications that request access to your media, can be used to encrypt files and gain complete control over them. These attackers can then demand ransom for the safe return of the files.

The researchers say the attack targets all three main PC operating systems (Windows, Linux, and Mac OS). Some cloud services (Apple Cloud, Box, and Google Drive), OneDrive, Dropbox, and external drives are vulnerable to the attack.

How Does It Work?

There are only two things that a malicious website needs to do to launch an attack.

  1. A person needs to say, ‘yes’ to a pop-up that asks them to share their files, such as ‘Allow this website to access your photos?’
  2. Someone must click, ‘yes,’ on a second pop-up, which is the attack. The system will disguise the pop-up as a benign message, such as an advertisement or a request like, “May we close the rest of your tabs for you?”

“These two pop-ups are so easy to click ‘yes’ to, it’s almost too tempting,” says Selcuk Uluagac, principal investigator of the research and professor of computer science at the Knight Foundation School of Computing.

Antivirus software systems allow these attacks because it is “standard practice for antivirus software to provide browsers with file access,” said Uluagac. “They do not detect that anything is wrong.”

The Power of Web Browsers

These hacks are possible due to the increasing power of web browsers, researchers say.

“Browsers have become much more powerful over time”, said a postdoctoral researcher and part of the cybersecurity team, Abbas Acar. “They can access cameras, files, locations, and even our batteries if we allow them to.”

These ‘browser powers’ typically make online life easier and more enjoyable. They make everyday life easier. The tech world refers to these capabilities as APIs (application programming interfaces), and they have become integral to today’s internet ecosystem.

The FIU’s research is significant because it reveals the vulnerabilities of one of the APIs most commonly used: File-sharing. Because people widely use file-sharing programs and anti-virus software usually considers them harmless, detecting ransomware attacks using them can be hard.

Explore solutions to protect against this ransomware

The researchers at the FIU looked for ways to protect users from this ransomware attack. They proposed three main ideas:

  • A browser-based defense solution that prevents an attacker from encrypting.
  • An app built into the computer that monitors files to see if they are about to be encrypted.
  • A notification system is built into the browser that warns users against possible threats.

The FIU team carried out the research using their prototype design and did not use any ‘wild’ websites, but Uluagac stresses that it is important for everyone to be aware that the ransomware threat is still out there.

When it comes to protecting your computer, the danger is not only in what you download; it’s also in what you upload. Be cautious when granting file access permissions, and stay informed about the evolving threats of ransomware.

Found this article interesting? Follow us on WhatsApp and LinkedIn to read more exclusive content we post.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew Loop DoS Attack Targets Hundreds of Thousands of Systems
Next Article Audio platform Vobble secures Seed round led by Lumikai
Infovistar
  • Website
  • Facebook
  • X (Twitter)
  • Instagram
  • LinkedIn

Related Posts

Cybersecurity

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025
Cybersecurity

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025
Cybersecurity

Hackers Target Mac Users with Apple ID Phishing Scam

March 28, 2025
Add A Comment

Comments are closed.

Blog Categories
  • AI and ML (93)
  • Android (4)
  • AWS and Cloud (7)
  • Blockchain and Cryptocurrency (6)
  • Case Study (7)
  • Chatbots (5)
  • Cybersecurity (71)
  • DevOps (5)
  • Object-Oriented Programming (2)
  • Payment Gateway (4)
  • Resources (5)
  • Search Engine Optimization (3)
  • Startup (34)
  • Tech News (70)
  • Tech Tips (12)
  • Technology (79)
  • Trading (6)
  • Web Development (23)
Top Posts

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,681 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Stay In Touch
  • Facebook
  • YouTube
  • WhatsApp
  • Twitter
  • Instagram
  • Pinterest
  • LinkedIn
Latest Articles

Subscribe to Updates

Get the latest tech news from FooBar about tech, design and biz.

Most Popular

Google is rolling out Identity Check Feature to Android 15

January 25, 20252,371 Views

How to Integrate Google Gemini to WhatsApp

February 16, 20241,681 Views

OpenAI Unveils Web-Based AI Agent Operator for Task Automation

January 24, 20251,502 Views
Our Picks

Ransomware 2.0: How AI Is Changing Cyber Attacks Forever

April 18, 2025

Lovable AI Faces Major Threat from VibeScamming Attacks

April 10, 2025

Top Trends to Include in Your Strategy for Digital Marketing in 2025

April 5, 2025

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

Facebook X (Twitter) Instagram Pinterest
  • About Us
  • Contact Us
  • Tools
  • Terms & Conditions
  • Privacy Policy
  • AdSense Disclaimer
© 2025 Infovistar. Designed and Developed by Infovistar.

Type above and press Enter to search. Press Esc to cancel.

Go to mobile version