Wed. Apr 24th, 2024

Expert Advice! Ransomware Protection

By KWS Adams Aug 29, 2017
Ransomware

Among all types of malicious software today, ransomware poses the greatest threat to home users and businesses, causing troubles of the highest level. There is hardly any user, even from the category of beginners, who have not heard about extortion viruses. In this post, we want address measures that will protect you from ransomware.

The information below will help you to stay away from the malicious actions of the extortion viruses even if your antivirus software cannot detect and stop it in time.

Timely backups

One of the most effective measures in the fight against encryption viruses is timely backups. Such a measure allows you to maintain copies of files in the current state and restore them in the case of malicious encryption. Since some ransomware types can also encrypt backup files on network drives, as well as removable media, it is important to store backup information on a medium that is not permanently connected to the computer or the Internet. Turn on the backup device \ disc once a day for several minutes to make the copies and keep it offline \ turned off the rest of the time.

Routinely upgrade all software and OS

It is well known that cyber criminals resort to using exploits and software vulnerabilities to launch ransomware executable files. The lack of updates of various software products installed on the system significantly increases the risk of infection by malicious software. Updating the software is possible both from the built-in OS features and also on the official website, where new versions of products are published.

Use antivirus software

Using a modern antivirus suite with HIPS and a firewall significantly reduces the risk of ransomware infections. Proactive protection helps to avoid infection by malicious software. New antivirus modules like web protection may block a malicious web link that leads to the download website. In addition, an active firewall will help to block the interaction between the executable file and the ransomware C&C server. This, in turn, can help avoid the infection in the event that the executable file has already been activated. Additionally, modern antiviruses provide email protection blocking many spam emails that carry ransomware.

Disable macros in Microsoft Office

Often it is the macro in Office documents that is used to load the ransomware executable file and its subsequent execution in the system. Hackers send tons of spam emails with malicious Word docs attached claiming them to be invoices or flight info or docs from lawyers and banks. Disabling the use of macros, you minimize the risk of launching ransomware executables.

Configure Windows to show hidden file extensions

Malicious programs often use an additional extension in the file name to mask it as being harmless files. For example, it might look like INVOICE.PDF. The user believes that he sees the real file extension, this info is actually erroneous. By default, Windows hides known file extensions (like a .exe extension). In reality, this file looks like this INVOICE.PDF.exe. Tweaking the appropriate Windows option will allow you to see the real file name extensions.

Filter executable files in email

The mail scanner should be configured in such a way that it blocks all messages containing known executable extensions like .exe, .bat, etc. To exchange executable files, it is better to use cloud storage or to archive them before sending them.

Disallow launching programs from the AppData / LocalAppData directories

Using Windows rules or an IPS-type system allows you to specify a setting that will prohibit running executable files from the AppData or LocalAppData directories. These locations are often used by extortionists to install and launch their ransomware. If you need to run a legitimate application from these locations, you must specify an exception to the rule.

Disable RDP

Cyber criminals often use the RDP (remote desktop protocol) to access Windows systems of their victims. If you do not use RDP, you can disable it for security reasons. Instructions for this can be obtained from the corresponding Microsoft Knowledge Base articles.

The following tips may help if you are already infected with ransomware.

  • If you come across a suspicious file that can be a ransomware, the file encryption process can still be prevented. To do this, disconnect the computer from the Internet. This will not allow the ransomware to contact its C&C server and exchange the crypto keys and thus stop the process of encrypting your files.
  • Sometimes malware authors make mistakes when encrypting files and make it possible for malware research experts to create a decryptor. Check the existence of such a decryptor, which can allow you to return access to your files.
  • Try to decrypt files using Windows features or 3rd party data recovery tools.
  • Consult with malware researchers on the dedicated ransomware support forums.

Conclusion

Ransomware is a real headache for all of us. Following the above tips will allow you to significantly reduce the risk of the infection. Since such viruses do not perform any suspicious activities on the system, and just implement file search and writing, they are not easy to distinguish from other legitimate software. This creates difficulties for the implementation of the mechanism for their proactive detection. Keep in mind that backups are crucial when your antivirus is not able to detect a ransomware based on its signature.

By KWS Adams

My name is KWS Adams . (Call me Kateregga). I am an IT addict who loves playing around with computers and internet. Computers help me try out different things while turning them into reality, while the internet powers me stay live online. Besides computers, I am a project planning and management professional with an Award obtained from MUK, one of the oldest and best Universities in Africa. Find me on Twitter, Facebook and Whatsapp. Find more on how to contact me using the contact me page.

Related Post

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.