This website uses cookies on its adverts and sponsored links. By clicking the "Accept" button you are consenting to their use.

Read more

Accept


Mobile Tech Tracker
≡ sections
Coding Courses

Tech Advice

Career Advice

Cybersecurity

Opinions

About

Welcome to Mobile Tech Tracker. Our mission is to help technically-minded people to become better versions of themselves and to help ordinary people to use modern smart technologies to their own advantage. If you want to support us, please consider visiting the pages of our advertisers.


It is possible to decrypt your files after ransomware attack

Ransomwhere is one of the most damaging malware types out there. Unlike it is with other types of malware, the consequences of cyberattack are not mended after removal of the infection. Any files that ransomware has encrypted remain unusable.

However, if you have been infected by one of those viruses, not all is lost. Some ransomware makers have decided to stop practicing cybercrime and have publically released their decryption keys. Among them is previously uncrackable TeslaCrypt.

However, you don't have to rely on ransomware authors to release their master keys when they feel like it. As cybersecurity industry becomes more familiar with this type of malware, antivirus manufacturers get better in detecting various ransomware signature patterns, which allows them to release decryption tools for their customers. This is mainly due to various weaknesses in the encryption algorithms in ransomware.

Therefore, if you have been unfortunate enough to suffer a ransomware attack and have your files encrypted, there could be a way out without paying the ransom. Just find out what you have been infected by and see if solution exists for your type of infection. If this isn't obvious, entering symptoms or text snippets from the ransom message into Google would be a good start.

Having said that, there are several ransomware types out there that haven't been cracked yet. If your machine has been infected by one of those, there are only two options: wait for the fix to be available (which may never happen) or pay the ransom. Therefore, the best cure is prevention.

These are the best steps you can follow to prevent ransomware infection or to significantly minimise the damage if it does occur:

1) By far, the best method of protecting against ransomware is to assume that any potential user of a particular computer or any other computer in a network may be susceptible to social engineering used by cybercriminals. Therefore, update the most important documents on a non-network external storage on regular basis. Network drives or any storage drives that happen to be connected to an infected machine will also have their files encrypted, therefore ensure that the back-up drive is physically disconnected once the backup process is complete.

2) Read about the best cybersecurity practices and spread the knowledge within your organisation. Don't click on the links or open any attachments in unsolicited emails. Carefully check the URL of any web forms before entering login credentials on them. Don't navigate to any sites you don't trust. Don't download any software, unless you definitely need it and can verify that the download comes from a trustworthy web page.

3) Have a copy of your most important documents and change the file extensions to either something random or something that would make the files look like executables (e.g. .dll, .exe, etc.). Ransomware would look for all files with specific file extensions, as it would be within the best interest of ransomware authors to keep your system fully operational. Most ransomware target documents (e.g. .docx and .pdf), media files (e.g. .mp3 and .avi) and various files used by professionals (e.g. .cs and .html). Therefore, any operating system components or files with random extensions are likely to remain intact after an attack.



For more information, follow this link:

https://goo.gl/0gbtWA


Published by

Posted on 31 Oct 2016




Tech News


VS Code is more popular than Visual Studio

VS Code is more popular than Visual Studio


.NET Core 3 will not run on .NET Framework

.NET Core 3 will not run on .NET Framework


.NET Core is set to replace .NET Framework

.NET Core is set to replace .NET Framework


If .NET Core is good enough for Bing, it's good enough

If .NET Core is good enough for Bing, it's good enough


Why does Google want to know my location

Why does Google want to know my location


Share this:

Facebook Google LinkedIn Twitter Become a Patron!


More from Tech News


VS Code is more popular than Visual Studio [VIDEO]


.NET Core 3 will not run on .NET Framework [VIDEO]


.NET Core is set to replace .NET Framework [VIDEO]


If .NET Core is good enough for Bing, it's good enough [VIDEO]


Why does Google want to know my location [VIDEO]


Q#, an emerging language for quantum computing [VIDEO]


Edge browser gets improved WebAssembly support [VIDEO]


Kubernetes gets fully integrated with Visual Studio [VIDEO]


Microsoft deploys an underwater data centre [VIDEO]


Microsoft grants organisations an easy access to blockchain [VIDEO]

Privacy Policy

© Mobile Tech Tracker. All rights reserved. Unauthorised copying of any of this website's content is prohibited under international law.

For any queries, comments or suggestions, please write to info@mobiletechtracker.co.uk.