Very few ways to stop ransomware
Private cyber crime investigator Mr. Sandeep Mudalkar said ransomware came into the limelight in 2005 when Russia was affected badly.
Hyderabad: Ransomware can be deadly for your system. This dangerous virus penetrates into a device through root/bios, which can’t be removed with antiviruses or by formatting the device. Except paying up to the hacker or waiting for patches to the virus by either operating system providers or anti-virus companies, there is no solution.
Private cyber crime investigator Mr. Sandeep Mudalkar said ransomware came into the limelight in 2005 when Russia was affected badly. “This is a kind of cyber-attack that involves hackers taking control of a computer or mobile device and blocking access to it until the victim pays a ransom,” he said.
Ransomware has now become a tool for cyber criminals to get access and target systems. They upload malicious software on to the targeted device through a network.
“This is often done by getting a victim to click on a link or download the virus program me by mistake. Once the software is on a victim’s computer, the hackers can launch an attack that locks all files through BIOS of computers and root of mobile devices. This tends to be a gradual process with files being encrypted one after another and they demand payment of about $300 in Bitcoins. Bitcoin is a digital currency used to make payments of any value without fees,” he said.
Security tips
How to recognise ransomware?
It’s obvious when your device has been infected with ransomware, since you most likely won't be able to access your computer.
How to remove ransomware?
Make use of your antivirus software’s ransomware removal tool, which should scan for and wipe out any ransomware attempts found on your computer.
Suggested free ransom ware removal tools
- Alcatraz Locker
- Apocalypse
- BadBlock
- Bart
- Crypt888
- CryptoMix (Offline)
- CrySiS
- FindZip
- Globe
- Hidden Tear
- Jigsaw
- Legion
- NoobCrypt
- Stampado
- SZFLocker
- TeslaCrypt
Protect your Desktop/laptop
- Use genuine software and update your operating system
- Ensure that a good antivirus software is installed
- Secure backup data or systems in offline
- Ensure backup data into external drive
- Check option of ‘show hidden file-extensions’
- Filter executable files (.EXE) in email
- Disable files running from AppData/LocalAppData folders
- Use the Cryptolocker Prevention Kit
- Disable RDP (Remote Desktop Protocol)
- Patch or update your software regularly
- Disconnect from WiFi or unplug from the network immediately if you find anything else on computer
- Use System Restore to get back to a known-clean state
- Set the BIOS clock back immediately after a virus attack to restore your computer
Protecting your organisation
- Vulnerability management and patching are must
- Control on code execution
- Filter web browsing traffic
- Control removable media access
- Train staff on technical issues
- Set up cyber lab & hire cyber security expert
- Monitor suspicious IPs during incoming and outgoing mails
- Maintain regular IPs in server logs
For Mobile devices
- Turn off applications (camera, audio/video players) and connections (Bluetooth, infrared, WiFi) when not in use. Keeping the connections ‘on’ may pose security issues and also drain out the battery.
- Never allow unknown devices to connect through Bluetooth
- Never keep Bluetooth on continuously
- Never connect to unknown and not trusted networks
- Never keep sensitive information like username/password on mobile phones
- Never forward virus-affected data to other mobilephones