Ransomeware-title image

I’ve just realized Ransomware and would like to share my views over this and am going to give you a Smart Guide that covers the Ransomware-Why, What & How? (No, would not be long and taking time, I’ll give it a brief and a smart walk over) It’s called that all you need to know about Ransomware and A Smart Guide that briefs on Ransomware!

Just as I hear and read people affected and been victims of Ransomware, thankfully I was not in that situation, being prepared with all the warning that were shared were, “Don’t shell out the penny” and that the decryption key does not reach you and even it does they would attempt serial times and the survival is questionable.

Oh yes! It’s the panic situation and all I was able to hear is backups, backups, backups!

I know the curiousity soars up and let me get into the path to detail you.

What should you know? On Friday, the May-12  2017, malware called Ransomware also known as  WannaCry, WCry, WannaDecryptor, and WannaCrypt started to attack computers. Mostly it targeted Windows Operating Systems of Corporates, Companies, Hospitals, Travel Industries and so on. Some of the victims of this malware were British hospitals, FedEx, Renault and much more.

Just get to know, How WannaCry works? Malware is a software which is designed to disrupt, damage, or gain authorized access to a computer system through mail attachment while users opening the attachment, or clicking on a link in an email, leads the program or the software to run.

Also note that we often open these attachments or click links out of curiosity, because the sender is someone in our address book or government authority. It creates the connection for WannaCry with its server then encrypts all the files and documents on the computer so the user cannot open them.

What is shocking is when the user tries to open the file it displays a message saying “Oops, your files have been encrypted!” and says you have three days to pay a $300 or $600 ransom.

Get to know which versions of Windows are affected, only older versions of Windows which are no longer supported were vulnerable, including Windows XP and Windows 8. 98% of WannaCry victims were running Windows 7.

Now let’s look at the path to freedom and try to follow these 4 step formula and conquer the criminals who are snatching money from you.

You may have to use the protection technique to get away being a victim. So, how do you protect from WannaCry. Microsoft has issued a security patch for Windows XP and Windows 8, a very unusual step for unsupported operating systems, which you can download from the links on Microsoft’s blog. This is one best thing that should be done.

How should the victims think about this issue?  Wondering is it, let’s think empathically. We hear the victims say they were contacted to pay the bitcoins for the decryption key and the predicament started thought again, again and again, well although decided to pay nothing worked and no decryption key as well. So, do not pay any cost and be smart was the advice from many.

Now, you may want to ask what if my system gets infected with WannaCry and what should you do?

First, don’t pay the ransom. It only encourages the criminals, getting paid is their end game. Some security experts predict there could be a free ‘fix’ to decrypt the files in a few days and remove the malware. There’s no guarantee you will get your files back even if you do pay.

What should we do to stay protective?

The best amazing little thing is known to protect your system and to secure your money that works best is always have a backup, backup, backup… make sure you have your working backups.
Ransomware is clever enough to scan your other network and infect other computers and even network storage drives (NAS drives) so most importantly make a backup on an external hard drive that you disconnect and keep safely somewhere.
Be cautious or never open any attachment in email until it is of much importance.
Keep your antivirus software in the system which is of updated version. Make sure you update all the software to the latest version.

I would certainly come up soon with much more details and you can access the infographic based on RansomWare here.