Ransomware attacks have been very common in the recent years especially in 2016, 2017 and last year. Although they haven’t hit the headlines lately, ransomware attacks still wreak havoc, and now they have shifted into other areas such as cryptocurrency. They can also go undetected till an attack has occurred due to recent upgrades and technological changes cybercriminals are building into them.
什么是勒索软件?

Ransomware is a family of malware which generally decrypts or wipes off your files and then demands some hefty amount of money for a decryption key or for your files to be restored. In the recent years, once you have been attacked by ransomware, you get a note saying “your files have been encrypted and to access them, pay a certain amount of cryptocurrency to a given address.”
Most ransomware attacks are propagated through networks, or via Trojans that are disguised as legitimate files. Others have worm abilities and can move through networks and replicate themselves without user interactions.
The most commonly known variants of ransomware are encrypting ransomware – most common, non-encrypting ransomware – this restricts access to files but doesn’t encrypt them, leak ware – this type of ransomware also doesn’t encrypt your files but threatens to publish your sensitive information online, and lastly, mobile ransomware – this type attacks mobile operating systems.
如何防范勒索软件?
以下是一些确保您能更好地应对勒索软件攻击的提示;
- Do regular backups; Ransomware attacks are after data and having a good backup in the first place ensure you are immune to these attacks. But even backups can be attacked by ransomware if they are stored in the devices or connected to the internet. To avoid this, back up your data into a hard drive and disconnect it from your device once the backing process has finished.
- Be cyber aware; Ransomware attacks begin as a simple download, and in a matter of seconds, a whole organization can be infected. Always be keen on what you download online, avoid suspicious links and never open email attachments from people you don’t know. Also, avoid clicking on ads.
- Install the latest software updates and security patches; Ransomware attacks exploit vulnerabilities that are not patched. For instance, the Wanna Cry ransomware attack became a worldwide menace, and it attacked organizations which did not apply an update released by Microsoft earlier on.
如果您是勒索软件攻击的受害者,该怎么办?
大多数受害者都会进入恐慌模式,因为他们想要拿回自己的文件,所以会急于支付赎金。有时,这是一个好主意,因为它是唯一的选择;有时,这是一个坏主意。我们将详细说明为什么支付赎金不是一个好主意。但首先让我们看看你能做些什么;
- 断开网络连接。如果勒索软件具有蠕虫能力,这样就能防止其传播。
- 确保不是恐吓软件;有些勒索软件攻击即使声称会加密用户文件,也不会加密。经常检查您的文件是否无法访问。
- Use a decryptor; antivirus companies have decryptor tools that can help you recover files encrypted by certain.
- Restore from backup; do a fresh install and restore your files to a state before the ransomware attacked.
- 报告事件;让有关当局甚至你周围的人知道有勒索软件在肆虐是个好做法。
为什么你永远都不该付钱?
您可能会被胁迫支付赎金以取回文件,但以下是您不应该支付赎金的原因。
- You might not get your files back; at times the ransomware may change as it propagates and loses its original purpose. In this case, even the authors don’t know how to decrypt your files, and they will continue demanding more money for nothing.
- 你很容易成为攻击目标。一旦你付了钱,你就会增加再次受到攻击的机会。
Always use a VPN – IPBurger VPN
If you like accessing free public Wi-Fi, ensure that you have your VPN turned on. Some malware can be injected via the free public Wi-Fi, and some of it might be ransomware. A VPN encrypts your internet traffic and tunnels it through a secure server to its destination. The encryptions ensure that your internet traffic is not visible to prying eyes such as malicious actors.




