ProPrivacy is reader supported and sometimes receives a commission when you make purchases using links on this site.

Ransomware – A Guide

Ransomware is an insidious new form of malware that is fast becoming the tool of choice for criminal hackers. Ransomware is dangerous, is increasingly sophisticated, and is becoming ever more common.

Crypto Locker

  • Lock-screen (or non-encrypting) ransomware - prevents you from accessing your computer. When you turn your computer on you are presented with a lock screen demanding payment. Many variants of ransomware claim to be an “official” demand for a fine
  • Bogus anti-virus (scareware) ransomware – claims to detect bogus problems (such as viruses) on your computer, and demands payment to “fix” them. This form of attack will often let you continue to use your computer, but will plague you with alerts and pop-ups, while also preventing you from accessing some programs. The good news is that this form of ransomware is usually the easiest to get rid of.

Thanks to the high likelihood of an easy payoff, cyber-criminals have taken to ransomware like fish to water. In June 2013 McAfee observed that the incidence of ransomware had doubled over the last year, after discovering 250,000 unique samples. In 2015 the FBI says it received 2,453 complaints about ransomware hold-ups, costing victims more than $24 million dollars. Notable examples of ransomware include Cryptolocker (now isolated), CryptoLocker.F (unrelated to CryptoLocker), CryptoWall (a clone of CryptoLocker), KeRanger, RSA4096, Manamecrypt, and Reveton.

Ransoms vary from between $10 to many hundreds of dollars and are usually demanded in Bitcoins.

Ransomware originally primarily targeted Windows PC’s, but versions that target all major platforms (including mobile ones such as iOS and Android) are increasingly common.

How does ransomware spread?

The primary vectors for the spread of ransomware are:

  • Phishing attacks – bogus or misleading emails that attempt to lure you to a website that is tricked-up with malware, or to download a malicious attachment.

  • Malvertising – which injects malicious or malware-laden advertisements into legitimate online advertising networks and webpages. A good example of this is the malvertising attack that recently hit the New York Times and BBC.

  • Other Infected computers – once files are infected, ransomware is easily transmitted between them via LAN networks or email, etc.

  • Pirate “cracks” – on torrent sites (and similar) it is common for program “cracks” or keygens (such as those used to pirate Adobe products) to be infected with ransomware.

How do I protect myself?

  1. Backup, backup, backup

    Regularly backing up your data is always a damn good idea, anyway, but is defiantly the very best defense against ransomware attacks. I always recommend implementing the 3-2-1 backup system (the original file, a second “local” copy, and a third copy stored on a cloud service.)

    Be sure to keep your local backup files separate from those on your computer. Do not store them on a local hard drive - you should use an external hard drive which you disconnect once backup is complete. This will help to ensure that your backup files do not become infected if those on your computer do.

    You should also backup regularly.

  2. Just say no!

    Receive an email that looks dodgy, or is from a sender you don’t know or are unsure about? Do not open it, let alone follow any links it contains, or download attachments!

    The same goes for clicking online ads, and anything else that you are unsure about.

  3. Use an adblocker

    These can protect you against some forms of malvertising, although I personally recommend using Privacy Badger + uBlock Origin instead. These browser extensions are not specifically adblockers, but will block most ads and are highly effective at preventing advertisers from tracking you across the internet.

    NoScript is another good option for Firefox users. It is a real pain to use, but provides the highest level of protection against malicious scripts on websites available.

  4. Use anti-virus software and keep it patched

    Anti-virus and other security software (such as phishing detectors) can be very effective at identifying and blocking ransomware attacks. No security product, however, can be considered 100 percent reliable.

    This is particularly true due to the fact that new malware is continually being developed and released into the wild. This is why it is vital to keep your virus software definitions up to date, and all your security related software (which includes the Operating System itself) patched with the latest security updates.

Help! I’m being held to ransom!!!!

So the worst has come to the worst. Your files or your computer are being held to ransom by ransomware, and you do not have any backups of your key files (tut-tut). With ransomware the motto that prevention is better than a cure has never been truer, but it’s not time to panic (yet!).

Should I just pay?

In an ideal world, victims could stifle this proliferation of ransomware simply by refusing to pay money to the cyber-criminals responsible. When faced with losing valuable and irreplaceable data, though, it is easy to see why many cave in. I strongly recommend against paying, however, because:

  1. It only encourages the extortionists to commit more crime.
  2. There is no guarantee that the crook will not simply keep on demanding more money. After all, these are not honourable people!

So what should I do?

  1.  Disconnect your computer from the internet - this will prevent your computer from infecting others, and in some cases may help to minimise how many of your files become infected.
  2.  Check to see how many files are affected – then backup all those which aren’t. You should store these files somewhere safe, but where they cannot infect another computer (just in case). An offline external hard disk is ideal for this.
  3.  Check them with an antivirus program - when opening these files on another computer. It is also a good precaution to then only open them within a sandbox (such as that provided by Sandboxie) or inside a Virtual Machine (such as VirtualBox). This will contain any malware infection they may still be carrying.
  4.  Research the ransomware – security researchers are actively developing tools to combat ransomware and decrypt files or unlock lock screens. If you can identify the type of ransomware that has infected your machine, then tools may be available may be able to help you.
  5.  Consult a computer technician or repair shop – in the case of more unsophisticated attacks, these may be able to help. They usually work on a no-fix no-pay basis, so you have little to lose.
  6.  Panic!

Whatever the final result, it is a very good idea to completely reformat all your hard drives and reinstall your OS (or hard factory reset your mobile device).

Ransomeware Conclusion

Ransomware is fast becoming a scourge of the modern world, and is even more worrying when you consider that not just unlucky individuals, but large business and even governments are potential targets. As discussed, there are a number of things you can do to reduce the chance of becoming a victim yourself. But by far the best thing you can do is to backup everything that is important to you both religiously and regularly. For great reviews of various online backup services, you might want to checkout our sister-site, BestBackups.com!

Written by: Douglas Crawford

Has worked for almost six years as senior staff writer and resident tech and VPN industry expert at ProPrivacy.com. Widely quoted on issues relating cybersecurity and digital privacy in the UK national press (The Independent & Daily Mail Online) and international technology publications such as Ars Technica.

8 Comments

Anne
on March 11, 2017
Hi Douglas I use two external hard drives to do my backups: I turn on Drive No.1 on odd numbered dates, and Drive No.2 on even numbered dates. So I figure if the worst happens to one drive, the other one will be ok, and only one day of data lost. My offsite backup is Dropbox. Is it safe to work on my important file in Dropbox itself? or should I work on files on my computer and then just store a copy in Dropbox for safety? Can you comment on my overall strategy please?
https://cdn.proprivacy.com/storage/images/proprivacy/02/member-dougjpg-avatar-image-default-1png-avatar-image-default-minpng-avatar_image-small_webp.webp
Douglas Crawford replied to Anne
on March 13, 2017
Hi Anne, Neat setup re. the hard drives. Working on files directly in Dropbox is should be safe enough, as Dropbox regularly saves and stores multiple previous versions of files. If any files were to become infected, you could therefore easily restore older versions of them. Ransomware will be able to infect the Dropbox folder on your PC, but it will not be able to directly infect file blacked up in the cloud. Dropbox might upload files infected on your PC to the cloud, but these could be restored using Dropbox's version system.
noname
on March 4, 2017
7. Search the unlock key in Internet. There is a websites with such codes. Not all codes will be there, but worth trying.
https://cdn.proprivacy.com/storage/images/proprivacy/02/member-dougjpg-avatar-image-default-1png-avatar-image-default-minpng-avatar_image-small_webp.webp
Douglas Crawford replied to noname
on March 6, 2017
Hi noname, Thanks for that tip, it could be vert useful.
Dan
on March 3, 2017
OpenDNS Home seems to be well regarded and claims to block phishing websites. https://support.opendns.com/hc/en-us/articles/227987987-Getting-Started-The-protection-and-filtering-provided-by-OpenDNS OpenDNS offers the following three types of security to prevent unsafe activity during your online sessions: 1. Known websites that attempt to infect visitors with malware or botnets are blocked. 2. Unknowingly visiting phishing websites is prevented. Our list of known phishing sites is updated daily. 3. OpenDNS can also block suspicious websites that use IP addresses that are reserved only for internal networks.
https://cdn.proprivacy.com/storage/images/proprivacy/02/member-dougjpg-avatar-image-default-1png-avatar-image-default-minpng-avatar_image-small_webp.webp
Douglas Crawford replied to Dan
on March 6, 2017
Hi Dan, The problem with OpenDNS is that it keeps logs of all domains (not individual web pages) that you visit. This is not great for privacy.
Mozef Kaddas
on October 16, 2016
Thank you Douglas for such a awesome article, I can't believe it that there such a form of malware can prevent someone from accessing his PC. I just have a question what about MacOS users, are they save? Yes I use Adblock that prevents malware and blocks ads too.
https://cdn.proprivacy.com/storage/images/proprivacy/02/member-dougjpg-avatar-image-default-1png-avatar-image-default-minpng-avatar_image-small_webp.webp
Douglas Crawford replied to Mozef Kaddas
on October 18, 2016
Hi Mozef, Thanks! Although more malware (including ransomeware) is targeted is targeted at Windows users than Mac users simply because there are more Windows users out there, this is changing rapidly. So no, macOS users are not safe, and using Adblock is almost certainly not sufficient to protect you from many/most forms of malware attack (icluidi8ng ransomware). For Macs, Avast! Free Antivirus for Mac and is well regarded, although other free good options are available.

Write Your Own Comment

Your comment has been sent to the queue. It will appear shortly.

Your comment has been sent to the queue. It will appear shortly.

Your comment has been sent to the queue. It will appear shortly.

  Your comment has been sent to the queue. It will appear shortly.

We recommend you check out one of these alternatives:

The fastest VPN we test, unblocks everything, with amazing service all round

A large brand offering great value at a cheap price

One of the largest VPNs, voted best VPN by Reddit

One of the cheapest VPNs out there, but an incredibly good service