Promoting Fiverr Gigs
May 8, 2017
সাইবার হামলার ঝুঁকি এড়াতে করণীয়
May 13, 2017

Ransomware & how to be safe?

Ransomeware

Ransomware
Ransomware stops you from using your PC. It holds your PC or files for “ransom”. This page describes what ransomware is and what it does, and provides advice on how to prevent and recover from ransomware infections.

What does ransomware do?

There are different types of ransomware. However, all of them will prevent you from using your PC normally, and they will all ask you to do something before you can use your PC.

They can target any PC users, whether it’s a home computer, endpoints in an enterprise network, or servers used by a government agency or healthcare provider.

Ransomware can:

Prevent you from accessing Windows.

Encrypt files so you can’t use them.

Stop certain apps from running (like your web browser).

Ransomware will demand that you pay money (a “ransom”) to get access to your PC or files. We have also seen them make you complete surveys.

There is no guarantee that paying the fine or doing what the ransomware tells you will give access to your PC or files again.

Details for home users

There are two types of ransomware – lockscreen ransomware and encryption ransomware.

Lockscreen ransomware shows a full-screen message that prevents you from accessing your PC or files. It says you have to pay money (a “ransom”) to get access to your PC again.

Encryption ransomware changes your files so you can’t open them. It does this by encrypting the files – see the Details for enterprises section if you’re interested in the technologies and techniques we’ve seen.

Older versions of ransom usually claim you have done something illegal with your PC, and that you are being fined by a police force or government agency.

These claims are false. It is a scare tactic designed to make you pay the money without telling anyone who might be able to restore your PC.

Newer versions encrypt the files on your PC so you can’t access them, and then simply demand money to restore your files.

Ransomware can get on your PC from nearly any source that any other malware (including viruses) can come from. This includes:

Visiting unsafe, suspicious, or fake websites.

Opening emails and email attachments from people you don’t know, or that you weren’t expecting.
Clicking on malicious or bad links in emails, Facebook, Twitter, and other social media posts, instant messenger chats, like Skype.

It can be very difficult to restore your PC after a ransomware attack – especially if it’s infected by encryption ransomware.

That’s why the best solution to ransomware is to be safe on the Internet and with emails and online chat:

Don’t click on a link on a webpage, in an email, or in a chat message unless you absolutely trust the page or sender.

If you’re ever unsure – don’t click it!

Often fake emails and webpages have bad spelling, or just look unusual. Look out for strange spellings of company names (like “PayePal” instead of “PayPal”) or unusual spaces, symbols, or punctuation (like “iTunesCustomer Service” instead of “iTunes Customer Service”).

Check our frequently asked questions for more information about ransomware, including troubleshooting tips in case you’re infected, and how you can backup your files to help protect yourself from ransomware.

Details for enterprises and IT professionals

The number of enterprise victims being targeted by ransomware is increasing. Usually, the attackers specifically research and target a victim (similar to whale-phishing or spear-phishing – and these in fact may be techniques used to gain access to the network).

The sensitive files are encrypted, and large amounts of money are demanded to restore the files. Generally, the attacker has a list of file extensions or folder locations that the ransomware will target for encryption.

Due to the encryption of the files, it can be practically impossible to reverse-engineer the encryption or “crack” the files without the original encryption key – which only the attackers will have access to.

The best advice for prevention is to ensure company-confidential, sensitive, or important files are securely backed up in a remote, un-connected backup or storage facility.
OneDrive for Business can assist in backing up everyday files.
In some cases, third-party tools released by some security firms are able to decrypt files for some specifically ransomware families. See our blog FireEye and Fox-IT tool can help recover Crilock-encrypted files for an example. Tim Rains, Microsoft Director of Security, released the blog Ransomware: Understanding the risk in April 2016 that summarizes the state of ransomware and provides statistics, details, and preventative suggestions to enterprises and IT professionals: Our Threat intelligence report: Ransomware also includes suggestions on prevention and recovery, statistics, and details.

Top ransomware

Ransom:Win32/Cerber
Ransom:Win32/Locky
Ransom:Win32/Spora
Ransom:Win32/HydraCrypt
Ransom:Win32/Critroni
Ransom:Win32/Teerac
Ransom:Win32/Troldesh

15 Items to take your ransomware protection to the next level

This is a promise that I want you to make to yourself: that you will take the threat of ransomware seriously and do something about it before it hits your data.

I’ve seen too many cries for help and too many people confused and panicking when their files get encrypted.

How I wish I could say that ransomware protection is not a life and death kind of situation! But if you work in a hospital and you trigger a crypto-ransomware infection, it could actually endanger lives. Learning how to prevent ransomware attacks is a need-to-have set of knowledge and you can do it both at home and at work.

So here’s what I want you to promise me:
Locally, on the PC

  • I don’t store important data only on my PC.
  • I have 2 backups of my data: on an external hard drive and in the cloud – Dropbox/Google Drive/etc.
  • The Dropbox/Google Drive/OneDrive/etc. application on my computer is not turned on by default. I only open them once a day, to sync my data, and close them once this is done.
  • My operating system and the software I use is up to date, including the latest security updates.
  • For daily use, I don’t use an administrator account on my computer. I use a guest account with limited privileges.
    I have turned off macros in the Microsoft Office suite – Word, Excel, PowerPoint, etc.

In the browser
I have removed the following plugins from my browsers: Adobe Flash, Adobe Reader, Java and Silverlight. If I absolutely have to use them, I set the browser to ask me if I want to activate these plugins when needed.
I have adjusted my browsers’ security and privacy settingsfor increased protection.
I have removed outdated plugins and add-ons from my browsers. I only kept the ones I use on a daily basis and I keep them updated to the latest version.
I use an ad-blocker to avoid the threat of potentially malicious ads.

Online behavior

I never open spam emails or emails from unknown senders.
I never download attachments from spam emails or suspicious emails.
I never click links in spam emails or suspicious emails.

Anti-ransomware security tools

I use a reliable, paid antivirus product that includes an automatic update module and a real-time scanner.
I understand the importance of having a traffic-filtering solution that can provide proactive anti-ransomware protection.

 

 

You can watch this video for more Details




With a passion for Knowledge, "Learning Code" has been created to explore things like Free Resources For Web Developers, Designers, Photographers, and Inspiration. Learning Code believes {no age limit to learn} . So We can start anytime. Also I wish you will join in this website. because its your website to promote yourself. Show your creativity.

Comments

comments

Learning Code
Learning Code
With a passion for Knowledge, "Learning Code" has been created to explore things like Free Resources For Web Developers, Designers, Photographers, and Inspiration. Learning Code believes {no age limit to learn} . So We can start anytime. Also I wish you will join in this website. because its your website to promote yourself. Show your creativity.