Connect with us

Few steps how to avoid ransomware attack

Few steps how to avoid ransomware attack

Other News

Few steps how to avoid ransomware attack

Few steps how to avoid ransomware attack

Since the latest ransomware attack happened, people have become more aware of the possibility of being hit by these malware/ransom viruses that are like virtual hijackers that are just waiting for the right opportunity to strike and rip honest working people and companies of their hard earned cash. To remind you what are we talking about here, on Friday, 12 May 2017 there was a worldwide cyber attack that targeted 230,000 computers in over 150 countries. WannaCry was the name of the ransomware and it hit parts of Britain’s NHS, Deutsche Bahn, FedEx, Spain’s Telefůnica and other companies. It targeted systems that weren’t updated with the latest security updates. Their files have been encrypted and ransom was demanded to be paid. Luckily, there was a kill switch that was found shortly for the malware, so no big payout was made….this time. This raises the question of your computer security and what you can do to protect yourself from these cyber criminals.

If you consider yourself to be a ransom worthy person, you might consider then doing a couple of the things that we’re going to suggest if you don’t plan on paying out a hefty sum to some nerds who want to get you because you browsed through some porn videos. If you prepare yourself properly, the encrypted files aren’t going to pose a problem but they’ll be just a pain in the butt, a problem that requires some grunt work. Here are some of the things that are smart to do in order to be ransomware secured:

  1. First of all, let’s go with the simple and the most basic things that you should do anyways and that’s to make a backup of all your files. Keep in mind that with these attacks the hackers are also encrypting files on drives that are mapped including files that you’re keeping on your external drives and any network or cloud file stores that you have assigned a drive letter to, so keep those backups fresh.
  2. If there’s a possibility in your gateway mail scanner to filter files by extension, by all means, do it. The most common way that a ransomware enters your computer is with a ď.EXEĒ file extension through your mail.
  3. Often times the malware can enter through Remote Desktop Protocol (RDP), where someone can enter your computer remotely. If you do not require the use of RDP, then just disable it to protect your machine from these attacks.
  4. Having both anti-malware software and a software firewall is a good idea for the protection of your files since you can never be too safe with intrusions like these. In order to avoid detection, new variants of malware are always sent out in order to avoid detection so this is why both layers of protection are needed, just in case. If a ransomware manages to run past the anti-malware software, when it tries to connect to its Command and Control server it can still be caught by a firewall, thus the double web of protection.
  5. Always get the latest updates and patches for your software. Malware attacks are often going for the outdated software users since they already know what the vulnerabilities are. If you can set it up so that you get automatic updates, good, if not make sure that you go directly to the site and download the update from the original source since malware authors disguise their bugs as software update notifications too.
  6. Just like the pull out method in sex, pulling the cord on the Internet connection can be a last minute resort if you realize that something shady is going on. Since it takes time to encrypt your files, you might want to try to stop the connection to the C & C server that has been made, before it finishes encrypting your files. This might not work, but it is better than doing nothing.
  7. you need to be one step ahead of the hackers

  8. If your System Restore is enabled on your computer, there might be a chance to bring your system to a known clean state. With this option, you need to be one step ahead of the hackers since they have the ability to delete the “ShadowĒ files from System Restore meaning, those files will not be there once you fix the damaged versions. The malware will start the deletion whenever the executable file is run or even as a normal part of your Windows systemís operation, without you knowing, so you need to be very fast.
  9. Usually the timer for paying the ransom is set for 72 hours…then the bomb explodes. You can try to set the BIOS clock back to a time before the 72 hours are up, otherwise, the price goes up. It seems it’s not just the movies that have these scenarios anymore.
Continue Reading
Live webcam sex! More than 20000 Hot Girls are waiting for you!
You may also like...
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

More in Other News

Subscribe to our newsletter

Please wait...
Want to be notified when our article is published? Enter your email address and name below to be the first to know.

Popular Posts

Recent Comments

To Top
Please wait...

Subscribe to our newsletter

Want to be notified when our article is published? Enter your email address and name below to be the first to know.