Has Ransomware Been Installed on Your Computer Systems?
Frequently Asked Questions
A sign that your computer had ransomware installed on it (and that you have been hacked) are that your web browser or desktop is locked with a message about how to pay to unlock your system and/or your file directories contain a “ransom note” file that is usually a .txt file.
Your files could have a new file extension appended to the file names.
- Examples of Ransomware file extensions: .ecc, .ezz, .exx, .zzz, .xyz, .aaa, .abc, .ccc, .vvv, .xxx, .ttt, .micro, .encrypted, .locked, .crypto, _crypt, .crinf, .r5a, .XRNT, .XTBL, .crypt, .R16M01D05, .pzdc, .good, .LOL!, .OMG!, .RDM, .RRK, .encryptedRSA, .crjoker, .EnCiPhErEd, .LeChiffre, .keybtc@inbox_com, .0x0, .bleep, .1999, .vault, .HA3, .toxcrypt, .magic, .SUPERCRYPT, .CTBL, .CTB2, .locky or 6-7 length extension consisting of random characters
Disconnect from all networks:
- Unplug Ethernet cables and disable wifi or any other network adapters.
- Put your device in Airplane Mode
- Turn off Wi-Fi and Bluetooth
This can stop the ransomware from spreading further to shared network resources such as file shares.
Immediately disconnect all external devices:
- USB drives or memory sticks
- Attached phones or cameras
- External hard drives
Ransomware is a type of malware that infects a computer. Both businesses (big and small) and individuals can fall victim to ransomware.
An alert will usually pop up on the screen and tells the user that their files are encrypted, and all systems have been blocked from accessing. The only way to get access to the data is by paying the ransom that the “hacker” requested. After the user pays the ransom, the user should get access back to all compromised data.
Ransomware is commonly spread through phishing emails that contain malicious links. Drive-by downloading also occurs when a user unknowingly visits an infected website. Malware is then downloaded and installed without the user’s knowledge. It can be weeks before a user realizes their system has been hacked.
- Having a data backup and recovery plan in position for all data on your systems is essential to protect your business’s or personal data. Regular backups limit the risk of losing more data and expedites the recovery process. These backups should be done on an off-site location.
- Make sure your operating system and software are up to date on all current patches.
- Maintain up-to-date anti-virus software on your systems.
- Do not follow unrecognizable Web links in emails. Hover your cursor above the link before clicking on it to see where the link actually directs to. You can also avoid falling victim to phishing by directly searching for the page without clicking the link.
How Can FusionTek Help You?
Ransomware is a serious issue that many businesses are learning the hard way. With the average cost of technology ransoms rising, many business owners are investing in the protection they need to be proactive. If you fall victim to a ransomware attack you are not only leaving your business at risk, you are leaving your client’s at risk.
Be Proactive and protect your business and data.
- Proactive Detection and Response
We test your internal and external systems for weak spots, recommend solutions to fix them and proactively monitor your systems.
- Endpoint Defense
Get the right defenses for your endpoint assets. Our security reduces risk and minimizes threat actor dwell time.
- Vulnerability Programs
Enhance risk management by letting us maintain your anti-virus, anti-spyware, anti-spam, firewalls and application updates completely.