{"id":2839,"date":"2020-03-05T17:00:00","date_gmt":"2020-03-05T11:30:00","guid":{"rendered":"https:\/\/www.24x7serversupport.com\/blog\/?p=2839"},"modified":"2020-11-24T02:55:34","modified_gmt":"2020-11-23T21:25:34","slug":"things-to-do-when-you-are-the-victim-of-ransomware","status":"publish","type":"post","link":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/","title":{"rendered":"Things To Do When You Are The Victim Of Ransomware"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">What is ransomware already?<\/h2>\n\n\n\n<p>Far be it\nfrom me to provide you with a complete and complex definition like&nbsp;<a href=\"https:\/\/fr.wikipedia.org\/wiki\/Ransomware\" target=\"_blank\" rel=\"noreferrer noopener\">Wikipedia<\/a>&nbsp;does so well&nbsp;.&nbsp;In summary, a&nbsp;<strong>ransomware will make the files<\/strong>&nbsp;on\nyour hard disk, usb stick, smartphone etc.&nbsp;<strong>unreadable<\/strong>&nbsp;.&nbsp;These attacks are\nfound on&nbsp;&nbsp;<strong>all\nmedia<\/strong>&nbsp;from the PC, to the&nbsp;<strong>Mac<\/strong>&nbsp;,\nincluding&nbsp;<strong>smartphones<\/strong>&nbsp;and&nbsp;<strong>tablets<\/strong>&nbsp;.<\/p>\n\n\n\n<p>Another\npeculiarity is that some ransomware can&nbsp;<strong>spread on internal<\/strong>&nbsp;corporate or\ndomestic&nbsp;<strong>networks<\/strong>&nbsp;.&nbsp;There\nhave even been cases where the ransomware&nbsp;<strong>waits before activating<\/strong>&nbsp;(notably on\nWindows ISOs downloaded in illegal ways).&nbsp;Or more recently it is one of\nthe methods of propagation of&nbsp;<strong>WannaCry<\/strong>&nbsp;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">1 &#8211; At the start of the attack isolate\nthe PC \/ Mac<\/h2>\n\n\n\n<p><strong>As\nsoon as you realize<\/strong>&nbsp;that you have\nbeen the victim of ransomware the first thing to do is&nbsp;<strong>to disconnect it from the network as\nquickly as possible<\/strong>&nbsp;.&nbsp;We have already seen it in the\npast and WannaCry has just re-confirmed that ransomware can try once on your PC\nor Mac or&nbsp;<strong>to spread\nto other stations on the network<\/strong>&nbsp;.&nbsp;Whether via WiFi\nor wired connections in all cases disconnected as soon as possible the infected\nPC.<\/p>\n\n\n\n<p>If you\ncannot disconnect the infected pc from the wifi, turn&nbsp;<strong>off the wifi while you finish\nprocessing the workstation<\/strong>&nbsp;.&nbsp;It is better for you to\nhave an interruption in wifi for a few minutes \/ hours rather than having&nbsp;<strong>all your computers infected<\/strong>&nbsp;with\nransomware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">2 &#8211; Attempt data recovery<\/h2>\n\n\n\n<p>If you\nhave&nbsp;<strong>n&#8217;t set up a backup<\/strong>&nbsp;&nbsp;and\nvery important files have been encrypted then you should be&nbsp;<strong>having a few cold sweats<\/strong>&nbsp;at\nthis point.&nbsp;Keep calm and&nbsp;<strong>don&#8217;t\npay the ransom<\/strong>&nbsp;.&nbsp;Why ?&nbsp;Quite simply you are not\nsure to recover your files.<\/p>\n\n\n\n<p>With\nanother PC, go to the following site:&nbsp;&nbsp;<a href=\"https:\/\/www.nomoreransom.org\/fr\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.nomoreransom.org\/index.html<\/a><\/p>\n\n\n\n<p>The\npurpose of the site and to&nbsp;<strong>offer<\/strong>&nbsp;you&nbsp;<strong>help directly<\/strong>&nbsp;to&nbsp;<strong>free you<\/strong>&nbsp;from\nransomware indeed there are&nbsp;<strong>tools<\/strong>&nbsp;developed\nby the&nbsp;<strong>majors of\ncomputer security<\/strong>&nbsp;that can help you recover your files\nand&nbsp;<strong>this for free<\/strong>&nbsp;.<\/p>\n\n\n\n<p>Attention\nhowever&nbsp;<strong>there is not\na solution for all the ransomware<\/strong>&nbsp;if it is the case of the\nransomware of which you are victim and that you do not have a backup I am\nsorry, but you only have the poker stunt pay the ransom,&nbsp;<strong>again I don&#8217;t recommend it<\/strong>&nbsp;.<\/p>\n\n\n\n<p>You can\nalways&nbsp;<strong>contact\ncomputer security experts<\/strong>&nbsp;to help you, but there is a cost\nand it is not certain that they can help you find your files.&nbsp;At times\nmourning non-vital files will be preferable.<\/p>\n\n\n\n<p>Last chance\npatience indeed&nbsp;<strong>over\ntime a solution to decrypt the ransomware may see the light of day<\/strong>&nbsp;,\nbut beware some ransomware&nbsp;&nbsp;<strong>impose\na payment deadline<\/strong>&nbsp;before destroying your files.&nbsp;So\nif there is no recovery solution and your data is important,&nbsp;<strong>keep the disk safe<\/strong>&nbsp;while\nwaiting for a solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">3 &#8211; Reinstall your PC \/ Mac<\/h2>\n\n\n\n<p>If&nbsp;<strong>you have backups<\/strong>&nbsp;of\nyour data do not try to restore your computer,&nbsp;<strong>reinstalling it properly<\/strong>&nbsp;will\nbe more effective.&nbsp;If you had to first decrypt your data once it has been\ncopied and saved, you must also reinstall your computer.&nbsp;For a person who\nis used to 2\/3 hours everything is operational again in business your CIO or\notherwise your service provider will be able to carry out these actions&nbsp;<strong>without the slightest concern<\/strong>&nbsp;.<\/p>\n\n\n\n<p>Once\nreinstalled,&nbsp;<strong>update\nthe product to 100%<\/strong>&nbsp;, do not forget the&nbsp;<strong>anti-virus even on Mac OS<\/strong>&nbsp;.<\/p>\n\n\n\n<p>It\nis&nbsp;<strong>important to\nformat and reinstall<\/strong>&nbsp;your computer if you have backups or\nrecovered your data, since it is very likely that&nbsp;<strong>the hacker took advantage of the\ninstallation of the ransomware to install other malicious software<\/strong>&nbsp;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Ransomware\nis&nbsp;<strong>not synonymous\nwith disaster<\/strong>&nbsp;, if you take the right precautions upstream\nit will be just a&nbsp;<strong>little\ntime wasted<\/strong>&nbsp;.&nbsp;If you do not have the possibility of\nrecovering your data it can turn into a nightmare in business and&nbsp;<strong>sign the death knell for the latter<\/strong>&nbsp;.<\/p>\n\n\n\n<p>Data\nbackups are computer security what the car seat belt is&nbsp;<strong>one of the great basics to always use<\/strong>&nbsp;.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Bonus &#8211; In prevention make backups<\/h2>\n\n\n\n<p>The&nbsp;<strong>best defense<\/strong>&nbsp;against\nransomware is to&nbsp;<strong>make\nbackups of your workstations<\/strong>&nbsp;on External hard drives, so\nthat it is&nbsp;<strong>really\neffective<\/strong>&nbsp;do not hesitate to have&nbsp;<strong>two hard drives<\/strong>&nbsp;with\nthe same data.&nbsp;So if unfortunately during a backup you infect your disk\nand it is also encrypted&nbsp;<strong>you\nwill still have a copy<\/strong>&nbsp;.<\/p>\n\n\n\n<p>To\nproperly manage your backups, you&nbsp;<strong>should\nnot leave<\/strong>&nbsp;&nbsp;your backup disks&nbsp;<strong>permanently connected<\/strong>&nbsp;to\nyour computer or the electrical network.&nbsp;It should ideally be placed\nin&nbsp;<strong>a lockable\ncupboard<\/strong>&nbsp;and if possible not a cupboard exposed to direct\nsunlight, because the discs support the heat, but if we can avoid them it is\nalready taken for life of the disc.<\/p>\n\n\n\n<p>Depending\non your use, you will have to make backups&nbsp;<strong>more or less often between one per day to one per week<\/strong>&nbsp;or\neven per month if you have not modified \/ added important data for a long time.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is ransomware already? Far be it from me to provide you with a complete and complex definition like&nbsp;Wikipedia&nbsp;does so well&nbsp;.&nbsp;In summary, a&nbsp;ransomware will make the files&nbsp;on your hard disk, usb stick, smartphone etc.&nbsp;unreadable&nbsp;.&nbsp;These attacks are found on&nbsp;&nbsp;all media&nbsp;from the PC, to the&nbsp;Mac&nbsp;, including&nbsp;smartphones&nbsp;and&nbsp;tablets&nbsp;. Another peculiarity is that some ransomware can&nbsp;spread on internal&nbsp;corporate or domestic&nbsp;networks&nbsp;.&nbsp;There [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[210],"tags":[233],"class_list":["post-2839","post","type-post","status-publish","format-standard","hentry","category-security","tag-ransomware"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog\" \/>\n<meta property=\"og:description\" content=\"What is ransomware already? Far be it from me to provide you with a complete and complex definition like&nbsp;Wikipedia&nbsp;does so well&nbsp;.&nbsp;In summary, a&nbsp;ransomware will make the files&nbsp;on your hard disk, usb stick, smartphone etc.&nbsp;unreadable&nbsp;.&nbsp;These attacks are found on&nbsp;&nbsp;all media&nbsp;from the PC, to the&nbsp;Mac&nbsp;, including&nbsp;smartphones&nbsp;and&nbsp;tablets&nbsp;. Another peculiarity is that some ransomware can&nbsp;spread on internal&nbsp;corporate or domestic&nbsp;networks&nbsp;.&nbsp;There [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"24x7serversupport Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-05T11:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-23T21:25:34+00:00\" \/>\n<meta name=\"author\" content=\"24x7support\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:site\" content=\"@24x7serversuppo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"24x7support\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/\",\"name\":\"Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\"},\"datePublished\":\"2020-03-05T11:30:00+00:00\",\"dateModified\":\"2020-11-23T21:25:34+00:00\",\"author\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.24x7serversupport.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Things To Do When You Are The Victim Of Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#website\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/\",\"name\":\"24x7serversupport Blog\",\"description\":\"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401\",\"name\":\"24x7support\",\"url\":\"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog","og_description":"What is ransomware already? Far be it from me to provide you with a complete and complex definition like&nbsp;Wikipedia&nbsp;does so well&nbsp;.&nbsp;In summary, a&nbsp;ransomware will make the files&nbsp;on your hard disk, usb stick, smartphone etc.&nbsp;unreadable&nbsp;.&nbsp;These attacks are found on&nbsp;&nbsp;all media&nbsp;from the PC, to the&nbsp;Mac&nbsp;, including&nbsp;smartphones&nbsp;and&nbsp;tablets&nbsp;. Another peculiarity is that some ransomware can&nbsp;spread on internal&nbsp;corporate or domestic&nbsp;networks&nbsp;.&nbsp;There [&hellip;]","og_url":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/","og_site_name":"24x7serversupport Blog","article_published_time":"2020-03-05T11:30:00+00:00","article_modified_time":"2020-11-23T21:25:34+00:00","author":"24x7support","twitter_card":"summary_large_image","twitter_creator":"@24x7serversuppo","twitter_site":"@24x7serversuppo","twitter_misc":{"Written by":"24x7support","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/","url":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/","name":"Things To Do When You Are The Victim Of Ransomware | 24x7serversupport Blog","isPartOf":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#website"},"datePublished":"2020-03-05T11:30:00+00:00","dateModified":"2020-11-23T21:25:34+00:00","author":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401"},"breadcrumb":{"@id":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.24x7serversupport.com\/blog\/things-to-do-when-you-are-the-victim-of-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.24x7serversupport.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Things To Do When You Are The Victim Of Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.24x7serversupport.com\/blog\/#website","url":"https:\/\/www.24x7serversupport.com\/blog\/","name":"24x7serversupport Blog","description":"Linux | CPanel | WHM | webhosting| Plesk | DirectAdmin | CentOs | Debian | Ubuntu Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.24x7serversupport.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.24x7serversupport.com\/blog\/#\/schema\/person\/decfb5fad6bde6ac6822d4e965c6d401","name":"24x7support","url":"https:\/\/www.24x7serversupport.com\/blog\/author\/24x7support\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/comments?post=2839"}],"version-history":[{"count":1,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2839\/revisions"}],"predecessor-version":[{"id":2840,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/posts\/2839\/revisions\/2840"}],"wp:attachment":[{"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/media?parent=2839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/categories?post=2839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.24x7serversupport.com\/blog\/wp-json\/wp\/v2\/tags?post=2839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}