What can I do to prevent ransomware infections?

‘In the first half of 2020, the total number of global ransomware reports increased by 715% year-over-year.’ (Threat Landscape Report 2020 by Bitdefender)

  • Update and patch your computer. Ensure your applications and operating systems (OS’s) have been updated with the latest patches. Vulnerable applications and OS’s are the target of most ransomware attacks.
  • Use caution with links and when entering website addresses. Be careful when clicking directly on links in emails, even if the sender appears to be someone you know. Attempt to independently verify website addresses (e.g., contact your organization’s helpdesk, search the internet for the sender organization’s website or the topic mentioned in the email). Pay attention to the website addresses you click on, as well as those you enter yourself. Malicious website addresses often appear almost identical to legitimate sites, often using a slight variation in spelling or a different domain (e.g., .com instead of .net).
  • Open email attachments with caution. Be wary of opening email attachments, even from senders you think you know, particularly when attachments are compressed files or ZIP files.
  • Keep your personal information safe. Check a website’s security to ensure the information you submit is encrypted before you provide it.
  • Verify email senders. If you are unsure whether or not an email is legitimate, try to verify the email’s legitimacy by contacting the sender directly. Do not click on any links in the email. If possible, use a previous (legitimate) email to ensure the contact information you have for the sender is authentic before you contact them.
  • Inform yourself. Keep yourself informed about recent cybersecurity threats and up to date on ransomware techniques. You can find information about known phishing attacks on the Anti-Phishing Working Group website. You may also want to sign up for CISA product notifications, which will alert you when a new Alert, Analysis Report, Bulletin, Current Activity, or Tip has been published.
  • Use and maintain preventative software programs. Install antivirus software, firewalls, and email filters—and keep them updated—to reduce malicious network traffic. (See Understanding Firewalls for Home and Small Office Use.)

How Ransomware Works?

 

In order to better protect, it is vital to understand how ransomware takes control of a computer.

Basically, a ransomware sneaks into the PC through Phishing Emails disguised as necessary files or software updates. When the victim opens the email or downloads the content, the ransomware stealthily installs itself on the computer and starts running in the background. The Computer user is clueless about what is going on in the background.

The hacker locks up all the important files and denies access to the user. The compromised computer displays a message stating that the files are unavailable and will only become accessible if the victim transfers the ransom through untraceable Bitcoin payment. In order to gain access, a mathematical key is required and it can be provided only by the hacker.

Perceptibly, in the recent years, corporations have been targeted by hackers as it proves convenient for them to make easy big money. A good anti-virus in place can help identify such grave dangers before they arrive. However, if the system defense is breached then it requires a virus removal procedure to be done.

Types of Ransomware

  • Scareware
  • Screen lockers
  • Encrypting Ransomware

#Scareware

The Scareware comes packed with rogue security software and tech support scams.
The computer user receives a pop-up message stating that malware was discovered and the only way to get rid of it is to pay up.

If the user chose to do nothing about it, the system is likely to be bombarded with pop-ups, but the files stored in the system are essentially safe.

If a robust antivirus software program in place then it is easy to watch out for such ransomware infection. A robust security software guarding the PC will help evade such online dangers.

#Screen lockers

As the name suggests, the lock-screen ransomware freezes the PC completely once they get inside. When the user turns on the PC a full-size window will appear, often accompanied by an official-looking FBI or US Department of Justice seal. The message displayed reads that an illegal activity has been recognized on the PC and the user is entitled to pay the fine to restore the actions.

As a matter of fact, FBI does not freeze the user out of their computer or make demands for any money. When such things happen to take an experts guidance to resolve the issue. To avoid it, install an antivirus program today.

#Encrypting Ransomware

The hacker takes control of your files and encrypts them, later demands for the ransom to decrypt and redeliver. This is quite a dangerous as to not many security software are capable enough to restore them to you.

On the other hand, paying the ransom doesn’t mean there is a guarantee that the cybercriminals will give back you those files.

 

What do I do if my computer is infected with ransomware?

  • Home users: immediately contact your local FBI office or local U.S. Secret Service office to request assistance.
  • Organizations: immediately report ransomware incidents to your IT helpdesk or Service.
  • All users: change all system passwords once the ransomware has been removed.
  • Ensure your Operating system is clean and free of malicious infections create a true image of your drive and or both create a restore point using the windows system restore point tool.

Notes: The best ransomware protection software will be able to prevent ransomware not just infecting your computers, but also prevent it from being able to change “Encrypt” your files and folders. I recommend Comodo Internet Security,

Ransomware is exactly the scenario Comodo is designed to prevent, because Comodo has solved the malware problem, and in a very non-invasive way.

Comodo’s containment model allows unknowns to run in a protected environment until they are determined to be good, at which time they are released, or determined to be malware, in which case they are removed completely from the system.

Unlike other sandbox approaches, Comodo’s platform is not taxing to your system’s resources, and does not slow down other operations.

Contact me if you need assistance.

Prevention is key and far easier than removing the unwanted infection.

 

Paying the ransom doesn’t mean there is a guarantee that the cybercriminals will give back you those files or release the current encryption.