- First, the victim's computer system is compromised by the malware, usually via a malicious link known as a Phising or "contaminated" attachment. The user is induced to download the file, often through social engineering techniques.
- In a second stage, the malware takes control of the system. Various types of files are encrypted and the user can no longer access them. Be aware that ransomware can spread throughout a company's network and contaminate an organization's entire database.
- After encryption, the victim is informed, usually by an on-screen notification, that they have been affected by the ransomware and must pay a ransom to regain access to the system. The process for paying the ransom is detailed.
- The last stage consists of the victim paying the ransom and, theoretically, regaining access to the system by providing a decryption key.
How to deal with ransomware?
Ransomware incidents can seriously affect business processes and leave organizations without the data they need to operate and provide mission-critical services. Faced with this scenario, companies should be cautious when deciding whether or not to pay the ransom. This is because, in concrete terms, nothing forces criminals to lift the encryption. There have been many reports of companies being unable to recover their data, permanently losing the ransom paid and also the data. According to the aforementioned Sophos study, of the companies interviewed that paid the ransom, only 8% claimed to have fully recovered their data. Therefore, before making any decision, certain protocols must be followed, such as: - Notify the authorities of what has happened; - Isolate the compromised systems; -Take care with backups; - Do not reboot or perform system maintenance; - Identify the type of ransomware; Therefore, by paying the ransom, companies are running the serious risk of losing their money and constantly having to deal with new demands from cybercriminals. The different types of ransomware As already mentioned, ransomware is a subset of malware, which means that there are different types of this threat. The three main categories are worth mentioning:- Scareware: this is "fake" ransomware that consists of exploiting the victim's fear. This is, for example, a pop-up announcing that malware is encrypting the computer and that the only way to stop the process is to pay a ransom. However, no files are actually encrypted.
- Screen locker: this type of ransomware can completely block access to a device, such as a computer. As soon as the device is turned on, a window opens in full screen, announcing the lock and demanding a ransom. In general, data is not compromised.
- Crypto-ransomware: this type of ransomware is capable of encrypting all the files stored on a device, network or server. This is the most dangerous category because there is no security software capable of fully recovering encrypted data.
- Isolate infected devices and any device acting suspiciously by disconnecting them from the Internet and your network.
- Identify the type of ransomware and inform your team about the signs of infection to look out for.
- Investigate the source of the attack in order to correct the vulnerabilities and prevent further incidents.
- Identify all affected systems, data and devices, including laptops, external hard drives, smartphones, USB sticks and cloud storage.
- Restore the affected data using your backup files.
- You may need professional help from a cyber security company to include additional steps if necessary.
[/vc_column_text][/vc_column][/vc_row]