Ransomware 101

Ransomware is a form of malware that encrypts files on an infected device and holds them hostage until the user pays a ransom to the malware operators. Millions of dollars have been extorted through ransomware attacks
ransomware-1080x477

Types of Ransomware

  1. Encrypting ransomware, which integrates advanced encryption algorithms. It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content.
  2. Locker ransomware, which locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the attackers still ask for a ransom to unlock the infected computer.

How Ransomware Works

Ransomware usually enters devices as a Trojan, disguised as a normal file that is downloaded unintentionally by the user.

Upon execution, ransomware begins encrypting the files on an infected device and typically displays a message informing the victim that their files can only be decrypted if a ransom is paid to the attackers.

The user is prompted to pay the operators, who may or may not supply a code or program to decrypt the files. Failure to pay the ransom within the time frame provided can result in an increased ransom amount or deletion of the encrypted files.

The most effective and dangerous types ransomware are those where only the creators of the program have access to the decryption key.

How Do I Protect Myself?

Prevention and Removal

  • Computer users should make sure their firewalls are always on
  • Avoid questionable websites and be alert when opening any suspicious email messages.
  • Choosing proven antivirus software from a reputable company can help protect your computer against the latest ransomware threats.
  • Make sure your IT Company scans any suspicious emails or attachments before opening

Tips for Ransomware Protection:

  • Back up your files regularly and frequently: having diligent data backup processes in place can limit the damage caused by a ransomware attack significantly, as encrypted data can be restored without paying a ransom.
  • Complete operating system and any software updates as soon as possible: software updates typically contain patches for security vulnerabilities and should be installed as soon as they’re made available.
  • Do not click on email attachments or links from unconfirmed sources: email is a popular medium for attacks that spread ransomware or other malware via infected attachments or links to malicious websites.
  • Disable remote desktop connections when possible: disabling this feature will prevent attackers or malware from being able to access users’ devices and files remotely.
  • Have a IT professional scan any suspicious emails or activity on your computer for the proper removal of possible ransomware/viruses
Share on facebook
Facebook
Share on twitter
Twitter
Share on linkedin
LinkedIn

2 thoughts on “Ransomware 101”

  1. Aw, this was a really nice post. In idea I would like to put in writing like this additionally ? taking time and actual effort to make a very good article? but what can I say? I procrastinate alot and by no means seem to get something done.

  2. Thanks for one’s marvelous posting! I really enjoyed
    reading it, you’re a great author.I will remember to bookmark your blog
    and will come back from now on. I want to encourage that you continue your great job, have a nice holiday weekend!

Leave a Comment

Your email address will not be published. Required fields are marked *

Computer Experts is your local full-service IT partner. Get in touch and find out how we can support your business and get rid of your IT headaches. We operate with a 1-Hour Response Promise and 100% problem resolution guarantee.

CONTACT US

© 2007 - 2018 computer experts

Get Started Solving Your IT Headaches

We're responsive, friendly and local!

Contact Us

We'll help you solve your IT headaches quickly.

Scroll to Top