Have you ever thought of your computer being kidnapped? In this new age, this is no longer ridiculous as several destructive ransomware variants (including LockBit, Hive, BlackCat, BlueSky, REvil, Petya, NotPetya, Locky, CyptoLocker, CryptoDefense, CyptoWall, etc.) appeared to kidnap computers in the world. The number of ransomware infections has been increasing!
Ransomware attacks victims through:
phishing emails with look of legitimate emails such as phony FedEx and UPS tracking notices with malicious file attached;
remote access service on a poorly secured system and infect other devices through networks or removable devices;
compromised website which targeted users with outdated or unpatched browser (e.g. IE) or plugins (e.g. Flash Player);
some banner ads to cause user device infected.
Once you open an anonymous attachment, or visit compromised website using outdated browser, ransomware will invade and encrypt your computer. Some attackers would extract the files before encrypting them. More horribly, these “criminal” encrypts files not only on your computer, but also within shared network drive(s).
After the files are encrypted, a popup will display on the infected computer asking the victim to pay ransom money typically in the range of 100-3000 USD within a time limit, otherwise, the only key for decryption will be deleted. Some attackers may even further applying different extortion methods like disclosing or selling the stolen information, distributed denial-of-service (DDoS), etc.
Stole and encrypts files on victims’ computers, e.g. LockBit encrypts files on victims’ computers and adds a .lockbit file extension to them.
Files on network drives and cloud services are affected.
Data will be unrecoverable due to encryption by ransomware.
Until now, there is NO effective method to decrypt all the kidnapped files. To save your computer from harms, please remember:
Keep your operating system and software up-to-date with the latest patches.
Alert to the suspicious email.
Do not open any malicious attachment, especially compress files (.zip,.7zip,.rar), or executable files (.exe).
Do not follow unsolicited web links in email messages.
This website uses Cookies, including Cookies from Google Analytics, to ensure you get the best browsing experience. If you “Continue” to use this site, you consent to the use of Cookies. Read more about Cookies
This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie
Duration
Description
cookielawinfo-checkbox-analytics
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional
11 months
The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance
11 months
This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy
11 months
The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.