What is Ransomware?
Ransomware is a piece of malicious software that infects a computer or device and encrypts the data making it inaccessible to the user. A ransom is then demanded to regain access to the victim's data. A time limit to pay the ransom is often imposed (usually 24-48 hours) or you risk losing access to the encrypted data forever. If a backup is unavailable or the backups were encrypted too, the victim is faced with paying the ransom to recover personal files. Payment must be paid in Bitcoin and the ransom cost can be anywhere from a few hundred dollars to thousands of dollars. Once the ransom is paid, the attacker will send a private key that will allow you to decrypt the data.
Tips for Avoiding Ransomware
- Back up your data - This won't prevent you from being infected with ransomware, but this is one of the most important things you can do in the fight against ransomware. Regularly backup your computer and data to an external hard drive and disconnect it from the computer. This would be considered an offline backup. Even better, backup your computer off-site with a cloud backup service so that even if you suffer a ransomware attack, you can easily restore all your data and not have to worry about paying a ransom.
- Keep your software updated - Make sure to regularly update your operating system and the software installed on it. Ransomware attacks can take advantage of known bugs and vulnerabilities to attack and infect devices.
- Watch for suspicious emails and links - Be careful clicking on any links or attachments that are emailed to you. The biggest vector for ransomware infections are emails. Even if you know the sender, be mindful the their email could be compromised and a hacker is using it to infect others. If you weren't expecting a file or link or the wording in the email seems off, it doesn't hurt to double check with the sender. Use a anti-spam or email security service that can help block emails before they reach your inbox.
- Use antivirus software - Use a reputable antivirus software and keep it updated. There are some great free antivirus softwares out there along with paid ones. If you go with a paid solution, don't let the subscription lapse so that you stop getting security updates.
- DNS filtering - Using a DNS filter like OpenDNS or Cisco Umbrella can help block malicious websites, content, and ransomware. By using a large database of blacklisted sites, the filter will check against the database when resolving a DNS query and then prevent the content from loading if it is blacklisted.
Dealing with a Ransomware Attack
If you are dealing with a ransomware attack now, here are some tips to handle it going forward.
- Isolate the infected machines - Try to prevent the infection from spreading any further by isolating all infected machines. Turn off the machines and disconnect them from the network by unplugging the Ethernet cable and disabling Wi-Fi, Bluetooth, and any other networking capabilities. Speed is of the essence and the longer a machine is turned on and connected to the network, the longer it has do encrypt your files and spread to other machines.
- Identify the type of infection - Try to identify the type of ransomware that is being used in the attack. It can help you understand how it spreads, the types of files it encrypts and possibly how it can be removed without paying a ransom to the attacker.
- Change login credentials - Ransomware can spread rapidly by gathering IP addresses and credentials. If the attacker manages to compromise administrative credentials they can move laterally around networks, encrypt files and wipe out backups in the process. To ensure your system is secured and to prevent attackers from thwarting your recovery efforts, you should immediately change all admin and user credentials.
- Assess the damages - To determine which devices have been infected, check for recently encrypted files with strange file extension names and look for reports of odd file names or users having trouble opening files. You should try to create a comprehensive list of all affected systems and data, including network storage devices, cloud storage, external hard drive storage (including USB thumb drives), laptops, etc.
- Notify the authorities - Once the ransomware has been contained, you will want to report the attack to the authorities. The FBI urges ransomware victims to report ransomware incidents regardless of the outcome. Victim reporting provides law enforcement with a greater understanding of the threat, provides justification for ransomware investigations, and contributes relevant information to ongoing ransomware cases.
- Evaluate recovery options - Ideally, you will have backups you can restore from. The quickest and easiest way to recover from a ransomware attack is to restore your systems from a clean backup. Alternatively, you may be able to remove the malware otherwise you will need to wipe all infected systems and reinstall. Performing a complete wipe of all storage devices and reinstalling everything from scratch will ensure that no remnants of the malware linger.
If you need assistance dealing with a ransomware attack, Pennyrile Technologies can help! Contact us for a free consult today!
Surveys have shown that 71% of all ransomware attacks are aimed at small to medium businesses (SMBs) and that in each event, businesses lose an average of about $2500. Because of this big payday, cyber criminals show no signs of slowing down, so it is up to you to protect yourself. Below, you can learn more about ransomware, how to prevent it, and what you should do if you are a victim.
What is Ransomware?
Ransomware is a form of malware, much like a computer virus, that makes its way into your systems and essentially holds your data hostage until you pay the criminal a sum of money they determine. The most common entry point for ransomware is infected email or phishing. According to Statista.com, 54% of all the ransomware attacks in 2020 were delivered in this manner, and others were delivered via online ads or through unsecured websites. For a small business, ransomware can be devastating, so most business owners simply pay the ransom instead of working to rid their systems of the malware, and this drives the criminals to continue finding new ways to infect other companies.
How to Prevent Ransomware
Because so many ransomware attacks originate in email attachments and links, the absolute best way for you to keep your business safe is to educate yourself and your employees on basic email safety. For example, you should always check the sender’s address and make sure you recognize it before you click a link or open an attachment. If you receive an email from a bank or other service provider that addresses you as “Customer” or your by your email address rather than your first and last name, do not click any link or download any attachment.
Other things you can do involve utilizing security software and a strong antivirus program, keeping both of these up to date, keeping redundant backups of all your data, and using cloud-based services wherever possible since you can simply bypass ransomware and roll back your data to a different point in time.
What to Do if You are a Victim
If you find yourself the victim of a ransomware attack, the first thing you should keep in mind is that you should never pay the ransom. Not only does this only encourage criminals to continue attacking small businesses, but there is never any guarantee that you will regain access to your data even after you pay. It isn’t uncommon for cyber criminals to demand multiple payments in succession from business owners who appear desperate to gain access to their data. The best course of action is to contact a professional right away. They can not only help you restore your data to get past the ransomware, but they can also do a network security check and offer solutions for common issues to prevent future attacks.
Ransomware is still a serious problem in today’s day and age despite advanced technology and incredibly secure antivirus programs. For the most part, though, avoiding ransomware is about being diligent and making certain that you always use best practices for email, web browsing, and more.