Ransomware was used to infiltrate one of the project computers in the year 2017. This happened while construction was being carried out on the Hong Kong Zhuhai Macao Bridge. As a result the files were wiped by the perpetrators.
While the incident didn’t impact the development of the project (the bridge opened to traffic a year later), it was a newsworthy story. It is a frightening example of ransomware. The ransomware program locks users out of their data and makes users to pay hackers in order to unlock them. Although it isn’t a new problem it can cause victims to lose millions.
AutoCAD can be used to create it.
Cyberattacks are only successful when the target isn’t aware of their existence. Auto CAD malware is created by hackers disguised as autocad files. They create the files with the same software.
The victim can open a project render and execute the malware script to cause chaos within the server. Encryption is utilized to make documents appear more genuine.
To increase the likelihood of malware-laden files being opened perpetrators code the file so that it replicates itself as soon as it is open. The files execute the script the same manner despite their differing size.
After the replication process is completed the process, they are more sophisticated. This data can revit also be used to modify registry values. This will limit C2 connections to one per day. The program could trick users into thinking that the file was made using an earlier version of AutoCAD.
It is a way to exploit human weaknesses
AutoCAD malware, as we have seen, is a terrifying and impressive invention. However, that’s only half of the formula. Experts describe the other half as old-fashioned tricks or social engineering.
Sending huge AutoCAD files, which could often be hundreds of megabytes is not an option. Third-party file hosting is a possibility, but it might not always work. Many AutoCAD files could be hundreds of megabytes in size and emailing them is not an alternative.
Ransomware, such as AutoCAD malware is one of the ten vectors used in social engineering. The result is the loss of over USD$30 billion.
It is preventable
Although the situation may appear grim, it’s not a reason to disregard all work-related files. These malicious files are easily prevented with using a combination of security methods and the most up-to-date security tools.
AutoCAD has a security feature that warns users to not open files on networks that are not secure. Adjust the security level to your preference (turning off not recommended) and then indicate the trusted places. Don’t ignore the warnings if they are displayed.