A while back, I posted a warning about Backups and Cloud Storage and how ransomware and in particular crypto viruses could destroy your cloud backed up files if they are automatically synchronised with your local files.
You are still safest to have a back up on a drive or system that is not always connected, and avoid getting ransomware on your system.
The problem of ransomware has prompted the National High Tech Crime Unit of the Netherlands’ police, Europol’s European Cybercrime Centre and two cyber security companies – Kaspersky Lab and Intel Security to create a project to help users infected with ransomware and also help them avoid being caught in the first place.
The project has a web site which has information on prevention, including my personal favourite setting….
Every time I sit on a new machine, I always turn off the Hide extensions for known file types option in Windows Explorer. I wish that Microsoft would remove this option or default it to off as it makes it really easy to hide program and script (.exe, .scr, .com, .vbs) extensions.
For example: you will be able to tell when AngelinaJolieNude.jpg is really AngelinaJolieNude.jpg.exe.
Just open Windows Explorer (Win+E) and on the View menu/ribbon select Options and change folder and search options.
Anyhow, back to the No More Ransom Project.
The website also has tools which can help you identify the encryption method and keys used on an infected system and also provides decryption tools. While they cannot guarantee being able to fix an infected system, they have helped many who have been caught.
Go check out the site:
The primary advice on the site is:
The general advice is not to pay the ransom. By sending your money to cybercriminals you’ll only confirm that ransomware works, and there’s no guarantee you’ll get the encryption key you need in return.
This article was originally posted on http://www.winthropdc.com/blog.