Bir Fidye Yazılımı Saldırısının Kurbanı Olursanız Ne Yapmalısınız?

Ransomware attacks have been very common in the recent years especially in 2016, 2017 and last year. Although they haven’t hit the headlines lately, ransomware attacks still wreak havoc, and now they have shifted into other areas such as cryptocurrency. They can also go undetected till an attack has occurred due to recent upgrades and technological changes cybercriminals are building into them.

Fidye yazılımı nedir?

Ransomware is a family of malware which generally decrypts or wipes off your files and then demands some hefty amount of money for a decryption key or for your files to be restored. In the recent years, once you have been attacked by ransomware, you get a note saying “your files have been encrypted and to access them, pay a certain amount of cryptocurrency to a given address.”

Most ransomware attacks are propagated through networks, or via Trojans that are disguised as legitimate files. Others have worm abilities and can move through networks and replicate themselves without user interactions.

The most commonly known variants of ransomware are encrypting ransomware – most common, non-encrypting ransomware – this restricts access to files but doesn’t encrypt them, leak ware – this type of ransomware also doesn’t encrypt your files but threatens to publish your sensitive information online, and lastly, mobile ransomware – this type attacks mobile operating systems.

Kendinizi Fidye Yazılımlarına Karşı Nasıl Korursunuz?

İşte fidye yazılımı saldırılarıyla başa çıkmak için daha donanımlı olmanızı sağlayacak bazı ipuçları;

  • Do regular backups; Ransomware attacks are after data and having a good backup in the first place ensure you are immune to these attacks. But even backups can be attacked by ransomware if they are stored in the devices or connected to the internet. To avoid this, back up your data into a hard drive and disconnect it from your device once the backing process has finished.
  • Be cyber aware; Ransomware attacks begin as a simple download, and in a matter of seconds, a whole organization can be infected. Always be keen on what you download online, avoid suspicious links and never open email attachments from people you don’t know. Also, avoid clicking on ads.
  • Install the latest software updates and security patches; Ransomware attacks exploit vulnerabilities that are not patched. For instance, the Wanna Cry ransomware attack became a worldwide menace, and it attacked organizations which did not apply an update released by Microsoft earlier on.

Bir fidye yazılımı saldırısının kurbanı olmanız durumunda ne yapmalısınız?

Çoğu kurban panik moduna girer ve dosyalarını geri istedikleri için fidyeyi ödemek için acele ederler. Bazen tek seçenek olduğunda bu iyi bir fikirdir, bazen de kötü bir fikirdir. Ödeme yapmanın neden iyi bir fikir olmadığının ayrıntılarına gireceğiz. Ama önce ne yapabileceğinizi görelim;

  • İnternet ve bağlı olduğunuz tüm ağlarla bağlantınızı kesin. Bu, solucan yeteneklerine sahipse Fidye Yazılımının yayılmasını önler.
  • Korku yazılımı olmadığından emin olun; bazı fidye yazılımı saldırıları, bunu yaptıklarını iddia etseler bile kullanıcı dosyalarını şifrelemezler. Dosyalarınızın erişilemez olup olmadığını her zaman kontrol edin.
  • Use a decryptor; antivirus companies have decryptor tools that can help you recover files encrypted by certain.
  • Restore from backup; do a fresh install and restore your files to a state before the ransomware attacked.
  • Olayı bildirin; yetkili makamlara ve hatta çevrenizdeki insanlara fidye yazılımının ortalıkta dolaştığını bildirmek iyi bir uygulamadır.

Neden hiç ödeme yapmıyorsunuz?

Dosyalarınızı geri almak için fidye ödemeye zorlanabilirsiniz ama işte bu yüzden yapmamalısınız.

  • You might not get your files back; at times the ransomware may change as it propagates and loses its original purpose. In this case, even the authors don’t know how to decrypt your files, and they will continue demanding more money for nothing.
  • Kolay bir hedef olacaksınız. Ödeme yaptığınızda, tekrar saldırıya uğrama şansınızı artırırsınız.

Always use a VPN – IPBurger VPN

If you like accessing free public Wi-Fi, ensure that you have your VPN turned on. Some malware can be injected via the free public Wi-Fi, and some of it might be ransomware. A VPN encrypts your internet traffic and tunnels it through a secure server to its destination. The encryptions ensure that your internet traffic is not visible to prying eyes such as malicious actors.

In this Article:
Leave behind the complexities of web scraping.
Opt for IPBurger’s advanced web intelligence solutions to effortlessly collect real-time public data.
Kaydolun

daha da derinlere dalın

Proxyler
AJ Tait
The Best HydraProxy Alternative for Reliability, Speed & Transparency

Why More Users Are Looking for a HydraProxy Alternative At first glance, HydraProxy seems like a solid choice. It’s affordable.It offers rotating and static residential proxies.And it gives users flexibility with pay-as-you-go pricing. For casual users? That’s enough. But for data scrapers, sneaker coppers, SEO specialists, and automation users who

Proxyler
AJ Tait
The Best Storm Proxies Alternative: Faster, Safer & More Affordable Proxies

Looking for a Storm Proxies Alternative? Storm Proxies sells the dream: simple, affordable proxies that “just work.” And for some users? It kind of delivers. Until it doesn’t. Because here’s the reality—if you’re pulling small data sets, running light scraping jobs, or dipping your toes into sneaker copping, Storm Proxies

Scale Your Business
With The Most Advanced
Proxies On Earth
1 Numaralı Ödüllü Proxy Ağına Katılın