What is it?
Ransomware or Scareware is a type of malware that tries to restrict access
to the information and ask for payment (ransom) to release the access.
This access restriction may be encryption of the data, modifying the data,
hiding the data, showing sticky message…etc.
A known ransomware trojan is CryptoLocker (or CPT) which started on late of 2013
uses encrypts certain types of files stored on local and mounted network drives
using RSA public-key cryptography, with the private key stored only on
the malware’s control servers.
The malware then displays a message which offers to decrypt the data if a payment
(through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline,
and threatened to delete the private key if the deadline passes.
If the deadline is not met, the malware offered to decrypt data via an online service
provided by the malware’s operators, for a significantly higher price in Bitcoin.
Depending on the type of the ransomware, the solution after infection maybe not be
possible and the data could be lost forever.
So, we emphasize to defend against being infected and recommend some
Ransomware is a malware so first advice is to install an AV software and we
recommend to try GData as it’s proven to be able to detect ransomware trojans
Keep the system (Windows Updates) and applications always update.
It’s good idea to have a patch management system. GData also provide it as a feature with the AV solution, so no need for extra
Schedule a periodic backup for important data at least every day or every time
you modify the data.
Save important information and backup on external storage that you use it only
for keeping a copy of the data. Also, it’s very important to not connect the
storage only on clean computers.
Also, having an online copy of important data is good idea.
Be aware of scams, fishing sites and spam with attachments and always try to not open
You can contact Security Triggers regarding security awareness training.
You can always contact us to defend against ransomware and other attacks