Ransomware Infection

WHAT IS RANSONWARE
Ransomware is a type of virus sent by hackers to encrypt your files and folders. Once infected, you will be asked to pay some amount of money to the hackers to get the files and folders decrypted.

HOW RANSOMWARE INFECT USERS
There are many types of Ransomware nowadays, and it can infect computers in may ways.
Commonly, Ransomware can be distributed through:

1. Links in emails or messages in social networks — In this type of attack, the victim clicks a malicious link in an email attachment or a message on a social networking site.
2. Pay per install — This popular method attacks computers that are already part of a botnet (a group of infected computers under the control of criminals called botmasters) — further infecting them with additional malware. Bot herders, criminals who look for security vulnerabilities, are paid to find these opportunities.
3. Drive-by downloads — This form of ransomware is installed when a victim clicks on a compromised website.
4. Outdated/Pirated OS - Outdated or pirated OS may cause user's computer to be infected by Ransomware, as attackers may exploit the computer through its vulnerabilities.

PREVENTIVE MEASURES TO AVOID RANSOMWARE
Below are some precaution actions recommended to be taken to avoid the issue from repeating.

1. Be wary of the mails that you receive. Do not click on any suspicious link/attachment in the mails.
2. Install and activate antivirus application on all computers. We recommend you to install Bitdefender (premium version), as it comes with antispam feature and Ransomware protection that can be integrated with email application such as MS Outlook.
3. Perform periodic full scan on the computer to ensure that it is clean from virus and malware.
4. Use original software and operating system, and ensure that it is updated from time to time to patch any security vulnerabilities.
5. Be careful of the files that you download to the computer, always ensure that it comes from trusted source only.

  • 1 Users Found This Useful
Was this answer helpful?

Related Articles

Web Application Firewall (WAF)

WAF stands for Web Application Firewall, it is a real-time protection installed on the server to...

Full scan of computer using Malwarebytes

If you suspect your password was stolen by viruses/malware/spyware infected in your computer,...

Deny jce hacking attempt

Filter jce hacking attempt with following method./index.php...

Firefox: This address is restricted

Error Message: This address is restrictedThis address uses a network port which is normally used...

How to protect my CMS from hacks?

Content Management System or better known as CMS such as WordPress, Joomla and etc. are commonly...