Ransomware Attack! - The Tek > Blogs
X

Blogs

10Feb

Ransomware Attack!

You have been attacked! Your files are encrypted. A screen pops up with instructions telling you that your files will be destroyed if you don’t comply. The clock is ticking down. What do you do?
 

ransom2


Unfortunately, ransomware attacks are on the rise globally. Attackers have learned that small to medium sized businesses are prime attack targets. It’s a numbers game to cyber criminals. Why take the risk of attacking a Fortune 500 company and asking for thousands of dollars when it easier and more profitable to attack 100 small businesses at $500 each.


Here is what ransomware attackers know: Small and medium sized businesses with less than 500 employees make up 99.7 percent of all U.S. companies and employ 56.8 million workers representing 48% of the entire U.S. workforce. Yet, most of the resources and advances in cyber protection technology are being pushed to Fortune 500 and large multi-national corporations. Less resistance and less security resources make the SMB market a prime attack surface.


So you have been attacked. What do you do? A few quick questions might run through your mind?


Do I have current and fully restorable back-ups?

Unfortunately, most small businesses do not have a routine back-up strategy. (If your company does not have a back-up and recovery strategy, get one! Back-ups are easy to do and are inexpensive.) Make sure your back-ups are not accessible via your network. A ransomware attack will encrypt your back-ups as well if they are accessible via your network.


Can we crack the encryption?

Typical ransomware software uses RSA 2048 encryption to encrypt files. Just to give you an idea of how strong this is, an average desktop computer is estimated to take around 6.4 quadrillion years to crack an RSA 2048 key. So, your odds of cracking the encryption are slim to none. There is a very slight chance that you may find some code available on the Net but the odds are unlikely and remember, the clock is ticking.


Am I really infected? Maybe this is just a scary scam?

It’s fairly straightforward to find out if you are affected by a ransomware virus. The symptoms are as follows:

  1. You suddenly cannot open normal files and get errors such as the file is corrupted or has the wrong extension.
     
  2. An alarming message has been sent to your desktop background with instructions on how to pay to unlock your files.
     
  3. The program warns you that there is a countdown until the ransom increases or you will not be able to decrypt your files.
     
  4. A window has opened to a ransomware program and you cannot close it.
     
  5. You see files in all directories with names such as HOW TO DECRYPT FILES.TXT or DECRYPT_INSTRUCTIONS.HTML.
     

OK This is real…I don’t have a valid back-up…the clock is ticking…what now?

  1. Disconnect: Immediately disconnect the infected computer from the network. Turn off any wireless capabilities such as Wi-Fi or Bluetooth. Unplug any storage devices such as USB or external hard drives. Do not erase anything or “clean up” any files or antivirus.
  1. Determine the reach: Where is the infected system and what it is connected to? Are there other network devices that are encrypted?
  1. Determine the strain: Check www.bleepingcomputer.com for help determining the strain.
  1. Evaluate Your Options: Now that you have some information about the reach and strain of the virus and an idea about your internal back-ups etc., you have four basic options. 1. Restore from back-up. 2. Decrypt using a third party decryptor. (unlikely) 3. Do nothing and lose your data. 4. Pay the ransom Unfortunately, most attack victims are forced to pay the ransom. Consider this an expensive lesson but do not be vulnerable to another attack. Most ransomware attacks are the result of phishing, spear phishing and social engineering exploits. Take steps to secure and back-up your data. A proper back-up strategy and a security awareness program to educate employees about the dangers of clicking or opening suspicious emails and attachments is one of the best investments you will make this year.
  1. Paying the ransom: Locate the payment terms. Most ransomware attacks will have very clear instructions on how much, what form of payment is required (typically Bitcoin) and where to send the payment. Follow the instructions closely.
  1. Obtaining Bitcoins: Using a Bitcoin broker site like http://www.LocalBitcoins.com will allow you to connect with a local seller. This may be your best bet in terms of obtaining Bitcoin the fastest. If you have time you can search the bitcoin exchange and set up an account. Bitcoin prices fluctuate so make sure you purchase a little more than the exact amount needed.
     
  2. Follow the instructions: The ransomware file will include specific instructions on where to send the payment. Once sent you may have to wait a few hours to receive the decryption key. Once you receive the decryption key you should be able to decrypt your device and save your files. Remember, there are no guarantees but in most cases decryption has occurred after payment.
  1. Finally: Understand that paying one ransomware exploit will not keep you from being attacked again. Take the necessary steps to protect yourself going forward.
     

For more information or to develop a simple affordable and secure plan to protect you and your company. Contact info@thetek.com

Related

Cybersecurity Is a Community Responsibility

By By Rick Miller - In the history of our democracy, we have never had a more open, free, and unre...

Read More >

Is your I.T. company proactive or reactive?

Is your I.T. company just doing break fix?  Do they provide any kind of remote monitoring capab...

Read More >

Open Letter: MSP to MSP—The Future is Here! Are you Ready?

Our world is changing. We are facing an environment where we have to be more than managed service pr...

Read More >

Password Management: The Struggle is Real!

Now a days, companies are using more and more online collaboration tools to be more productive and e...

Read More >

Achieving New Year's Resolutions Through Technology

As we set our New Year's resolutions, many of us are thinking about ways we can make changes wit...

Read More >

7 Quick Cyber Security Tips for SMB Business Owners

From Fortune 500 companies to SMBs, everyone knows that technology changes constantly. Depending on ...

Read More >
You need to login in order to comment
Sign up for our Newsletter
Name