Awareness of Ransomware Threats

  1. Overview
  2. Security and Privacy
  3. Awareness of Ransomware Threats

1. What Ransomware Is and How It Spreads

What is Ransomware?

  • Ransomware is a type of malicious software (malware) that locks or encrypts your files, making them inaccessible.
  • Attackers demand payment (a "ransom") to restore access, often with no guarantee they will do so after payment.

How Ransomware Spreads

  1. Phishing Emails:

    • Ransomware often spreads through fake emails with malicious attachments or links.
  2. Infected Websites:

    • Clicking on unsafe links or downloading files from unverified websites can install ransomware.
  3. Malicious Attachments:

    • Files such as PDFs, ZIPs, or documents containing macros may execute ransomware when opened.
  4. USB Drives:

    • Using an infected USB drive can transfer ransomware to your device.
  5. Unpatched Software:

    • Attackers exploit outdated software with vulnerabilities to install ransomware.
  6. Remote Desktop Protocol (RDP):

    • Weak or compromised RDP credentials can allow attackers to install ransomware remotely.

2. How to Avoid Downloading Malicious Attachments or Software

For Both Windows and Mac Users

Step 1: Be Cautious with Email Attachments

  1. Inspect the Sender's Email Address:

  2. Look for Warning Signs:

    • Spelling mistakes, generic greetings like “Dear User,” or urgent language (“Act Now!”) are red flags.
  3. Do Not Open Suspicious Attachments:

    • Avoid opening attachments such as ZIP files, PDFs, or documents unless you trust the sender.
  4. Verify Attachments:

    • If unsure, contact the sender using a trusted phone number or email, not by replying directly.

Step 2: Avoid Clicking Unknown Links

  1. Hover Over Links:

    • Hover your mouse over the link to preview the URL without clicking.
    • Ensure the domain matches the organization’s website (e.g., www.paypal.com).
  2. Go Directly to the Website:

    • Instead of clicking a link, manually type the organization’s website into your browser.

Step 3: Download Software Only from Trusted Sources

  1. Use Verified Websites:

    • Download software only from official websites or app stores like Microsoft Store or Mac App Store.
      • Example: For Zoom, go to zoom.us/download, not a third-party website.
  2. Avoid Free or Cracked Software:

    • Free downloads from unknown sites often contain malware.
  3. Check for HTTPS in the URL:

    • Ensure the website is secure by checking for HTTPS and a padlock icon in the browser.

Step 4: Disable Macros in Documents

  1. For Windows Users:

    • Open Word or Excel and go to File > Options > Trust Center > Trust Center Settings.
    • Select Disable All Macros with Notification.
  2. For Mac Users:

    • Open Word or Excel and go to Preferences > Security & Privacy.
    • Check Disable All Macros with Notification.

Step 5: Keep Your System Updated

  1. For Windows Users:

    • Go to Settings > Update & Security > Windows Update.
    • Click Check for Updates and install any available updates.
  2. For Mac Users:

    • Go to System Settings > General > Software Update.
    • Install any updates to keep your macOS and apps secure.

Step 6: Use Antivirus Software

  1. For Windows Users:

    • Open Windows Security > Virus & Threat Protection.
    • Ensure real-time protection is enabled.
  2. For Mac Users:

    • Use a trusted antivirus like Webroot, Norton, or Sophos, and ensure it’s running in the background.

Step 7: Avoid Using Public Wi-Fi Without a VPN

  1. Use a VPN for Public Wi-Fi:

    • A VPN encrypts your internet traffic and prevents attackers from intercepting your data.
    • Examples of VPNs: NordVPN, ExpressVPN.
  2. Disable File Sharing:

    • On Windows, go to Control Panel > Network and Sharing Center > Change Advanced Sharing Settings.
    • On Mac, go to System Settings > Sharing and turn off unnecessary sharing options.

3. What to Do If You Encounter Ransomware

  1. Disconnect from the Internet:

    • Unplug the network cable or turn off Wi-Fi immediately to prevent the ransomware from spreading.
  2. Do Not Pay the Ransom:

    • There’s no guarantee you’ll regain access to your files even if you pay.
  3. Report the Incident:

    • Notify your IT department or supervisor immediately.
  4. Use Backups:

    • If you have a recent backup, you can restore your system after removing the ransomware.
  5. Run a Full Virus Scan:

    • For Windows, use Windows Security.
    • For Mac, use your antivirus software.

Was this article helpful?