Geeks2U Promise
We guarantee you'll love our fast, friendly service - or we'll refund your money.  
133,572 Happy Customers & Counting
Need tech support?
1300 769 448
Extended hours, 7 days a week
Home  /  geekspeak  /  Ransomware on the rise, but what practical steps can you take?

Ransomware on the rise, but what practical steps can you take?

In the early days of computer security, viruses were largely destructive while often relaying self-aggrandising messages about their authors, or straight up offensive statements about precisely how stuffed your system now was, thanks to corruption of storage media, system BIOSes or other critical computer components. They were the brainchild of often bored and seriously immature minds that found thrills in trying to get away with destructive behaviour. It’s been long time since viruses and malware were simply interested in destruction, however.

Indeed, a lot of malware really doesn’t want to call attention to itself at all, whether it’s sitting silently on a compromised system slurping up personal information and passwords at will for financial gain, or turning your computer into part of a larger network of “zombie” machines for attacks on other systems. The whole idea of that strain of malware is that you’re not meant to know that it’s there. This doesn’t mean that it’s beneficial or you shouldn’t want to know that it’s present, just that its developers design it to stay hidden.

In recent years, though, we’ve seen the re-emergence of malware that actively wants you to know that it is present. Unlike classical viruses that splashed up a DOS screen of flashing text to let you know it was time to buy a new computer, newer malware acts as ransomware, encrypting your computer’s precious storage and offering to provide a decryption key for a set sum, quite often given in the cryptocurrency bitcoin.

Modern ransomware attacks are gaining in sophistication, using a variety of exploits to worm their way into systems, as well as to then try to propagate to newer internet-connected PCs as well. Even as new ransomware strains are detected and blocked, they’re iterated upon with a variety of new exploits, meaning it’s a perpetual game of cat and mouse to keep them under control.

How bad is the rise of ransomware? One security vendor, Symantec reports that it’s blocked some 319,000 attempted ransomware infections in the first half of 2017, compared to 470,000 for the entire calendar year of 2016. Bear in in mind that this is just one security vendor’s reporting, so the total numbers of attacks are likely to be significantly higher.

One interesting statistic to come out of Symantec’s research is the amount typically asked for by ransomware authors, which has now stabilised around $US500. That suggests that the ransomware authors have worked out a sum they feel is worth their time but isn’t so high that people simply won’t pay. Which, and I must stress this, you shouldn’t be doing in any way, shape or form anyway. By definition, you’re dealing with criminal types who cannot be trusted. Once they’ve got your money and your system compromised, you have no guarantee of getting a proper decryption code, and you’re essentially bolstering their illicit criminal model.

So what’s your best course of defence against ransomware? It’s critical to keep your computers (no matter the make, model or operating environment) up to date, because most ransomware will probe using multiple known exploits based on the idea that many systems aren’t upgraded to cover those exact same security holes. Equally, keeping antivirus/antimalware security software up to date is vital, because while it can’t cover every problem, it can solve for many, as well as making you aware when there is or may be a problem with your computer.

While those are must-do steps, for ransomware particularly there’s a simpler step that you should be engaging in anyway, and that’s backing up your own data to an external source, whether that’s cloud backup or more localised backup to an external drive or writeable media source of some type. That’s because if the worst does happen and your system gets locked down by ransomware, and you have a backup of your own documents, photos and other files, you can easily give the whole issue the flick by resetting your entire system, and restoring your files from backup. Yes, it’s a pain, and you’ll have to reinstall the operating system and software applications, but that’s something (especially with online delivery of software) that’s just a matter of time to cover off on. Your own files are the irreplaceable part of the equation, and a backup removes them from being at threat. Just remember to regularly backup, because that way you can access your own content recently created, where an older backup may miss important files or modifications.

Share

Recent News

Microsoft made its immense fortunes largely off the back of selling software. There would be a new version of Microsoft Office, or Microsoft Windows, and you’d pay a set sum for CD-ROM (or, going back even further, a bundle of 3.5 inch floppy disks) that would provide you with that software, typically accompanied by a… More 

Every year, the consumer electronics industry descends on Las Vegas, and not for the reasons one might feasibly head to Las Vegas for. OK, to be fair, a certain amount of gambling and drinking does go on, but it’s the backdrop for the Consumer Electronics Show, where the world’s big electronics companies — and thousands… More 

The new year is upon us, and with it, the promise of all sorts of new tech gadgets, with everything from foldable phones to smarter electric cars for sale. Connectivity is the glue that binds those two quite different concepts together, and indeed just about any other technology you’d care to name, because we absolutely… More 

So, what is your password? No, don’t answer that. Really, please don’t. Partly because the whole point of a password should be that it’s a secret known only to you, but also because there’s increasing evidence that we’re still not much better at password security than we were last year. Each year, SplashData (100-worst-passwords-top-50) puts… More