Get IT Solutions

How to do IT
Menu
  • Home
  • SCCM 2012
    • Deploy Packages
    • Troubleshooting errors SCCM 2012
  • Windows
    • Applications Silent Install
    • Windows Tools
    • Windows Error
    • Script
    • Exchange Server
    • Troubleshooting Office
    • Applications Errors
  • Database
    • SQL Server
    • MySQL
    • Oracle
  • Cybersecurity
  • Other
  • Reviews

Ransomware. What are they and how to do ransomware protection ?

A ransomware, is a malicious software that takes data hostage. A phishing email can be used to distributed them. It encrypts and blocks files contained on your computer including those shared on servers. You will lose access to these files and will have to pay a ransom to get them back. The purpose of the attack is to extort money (most often by virtual currency).

How to detect a ransomware?

They are usually hidden in a phishing email (with an attachment containing the virus or in a link that refers to a trapped site). They can sometimes take advantage of a System Vulnerability to install the virus autonomously on a workstation. There is no action to be done by the user. The tricks to detect them are the same as phishing email (see more here):
• The context of the e-mail is not plausible or the sender is not supposed to know the e-mail address of the recipient
• The sender’s address is unknown or suspicious
• The information requested is confidential: bank details, password…
• The tone of the e-mail is threatening or plays on empathy
• The e-mail contains spelling mistakes

Types of ransomware attacks

Two are the major themes where we can group:

  1. The ones who can lock you out of your computer, preventing you from logging on.
  2. The ones who encrypts your data files allowing you to log on but preventing you accessing any of your data.

The five types of ransomware are:

  • Crypto. This is a well-known form of and can cause a great deal of damage. One of the most familiar examples is the 2017 WannaCry ransomware attack. It targeted thousands of computers around the world and spread itself within corporate networks globally. You can find more about it here
WannaCry Ransomware

WannaCry Ransomware

  • Lockers. This kind is known for infecting your operating system to completely lock you out of your computer, making it impossible to access any of your files or applications.
Locker Ransomware

Locker Ransomware

  • Scareware. This is fake software that acts like an antivirus or a cleaning tool. Scareware often claims to have found issues on your computer, demanding money to resolve the issue. Some types of scareware lock your computer and other types flood your screen with annoying alerts and pop-up messages.
Scareware

Scareware

  • Doxware. Commonly referred to as leakware, doxware threatens to publish your stolen information online if you don’t pay the ransom. People store sensitive files and personal photos on their computers. Many individuals will panic and pay the ransom if they find that their files have been hijacked
Doxware

Doxware

  • RaaS. It’s known as “Ransomware as a Service,” and is a type of malware hosted anonymously by a hacker. These criminals handle everything from distributing the ransomware attack and collecting payments to managing decryptors — software that restores data access — in exchange for their cut of the ransom.
RaaS Business Model

RaaS Business Model

What are the risks of being infected?

Will take your data hostage and they can spread to all workstations connected to the same server. They can spread even to the entire Group Information System. This can lead to an infection and would result in the blocking of business activities.

Protection:

How to avoid being infected by ransomware attack:

  1. Do not click on suspicious links, do not open suspicious attachments
  2. Don’t pay the ransom: Law enforcement agencies discourage victims from paying ransom. First, there’s no guarantee that the criminals will release the user’s computer or data, and there are many examples where they didn’t, or asked for more money.  If criminals will continue to receive money from these attacks, there’s no reason for them to stop.
  3. Do back up important data to an external hard drive
  4. Do update your operating system and other software.
  5. If they are infected disconnect your devices from the network

 

Here we reviewed also best computers for cybersecurity and best computer for hacking!

 

Share
Tweet
Google+
Pinterest
Linkedin
Stumble
Email
Prev Article
Next Article

Related Articles

Windows Logon Types
Windows Logon Type are logged in the Logon Type field …

What are the different Windows Logon Type

How to enable Bitlocker is our next topic for the followers of …

Enable bitlocker Windows 7 and Windows 10

Best Computers & Laptops

Best Computer for Cyber Security – Laptop and Desktop
Best Computer for Cyber Security
Hey, are you seeking the best computer for cyber security? Well, we must say you have come to the right place to find your answer and guidance. There are a plethora of products out there for you to pick from ...
Read More
Best Computer for Microsoft Office & Excel – Laptop and Desktop
Best Computer for Microsoft Office & Excel
Are you finding the Best Computer for Microsoft Office and Excel? In modern days, the best laptop or desktop set is the one which is both portable, has good looks and offers the smoothest performance. Microsoft Office is a package ...
Read More
Best Computer for Hacking – Laptop and Desktop Selection
Best computer for Hacking
When it comes to hacking, either laptop or desktop, choosing the best computer for hacking would be an exhilarating job. There are many specifications to be considered for hacking ...
Read More

SQL Server Tips

FIX sqlstate 42000 – mysql error 1064 – you have an error in your sql syntax
Sqlstate 42000 Is a general code that come together with other number. Most often comes with the code 1064 and ...
Read More
The execute permission was denied on the object – SQL Server Error
The execute permission was denied on the object
The following article will handle “the execute permission was denied on the object” error appears on SQL Server. This error ...
Read More
How to Read Data from LDF file in SQL Server – A Complete Guide
Read LDF File
Hello Everyone, Today we are going to address the most popular query of SQL users, how to read data from ...
Read More

Search

We are on:

Get FREE SPACE for your PC

3 Method to Delete Temp Files in Windows 7/10 including vbs script

In this post we will explain how to delete temp files windows 7 using three different methods including vbs script ...
Read More

Fastest way to delete hiberfil sys from windows 10/8/7 and XP – CMD

In this article we will explain how to remove or delete hiberfil sys from Windows 10/8/7 and XP . If you does ...
Read More

Learn How to Silent Install Applications

Silent Install Adobe Flash Player
In this tutorial will explain how to silent install adobe flash player 25, Msi and Exe version. How to disable auto update and uninstall older ...
Read More
Java Silent Install and Uninstall Older Version – Deploy Package MSI
This tutorial will explain how to silent install Java MSI/EXE version and disable auto-update. The command line will also uninstall the ...
Read More
Silent Install Adobe Shockwave Player 12 and disable update
In this tutorial will explain how to silent install Adobe Shockwave Player 12 msi and disable auto update. The command will uninstall older ...
Read More
Silent Install Google Chrome MSI, Silent Uninstall and Disable Auto Update
This tutorial will explain how to silent install Google Chrome MSI and disable auto update. The command will uninstall older version of ...
Read More
Silent Install Adobe Reader 11 and DC – msi and exe – disable update
In this tutorial will explain how to silent install Adobe Reader version 11 and DC. We will user both version "msi" ...
Read More
Silent Install Mozilla Firefox msi and exe file – Including Silent Uninstallation
This tutorial will explain how to silent install Mozilla Firefox. We will use MSI and EXE files to perform a silent ...
Read More
Skype Silent Install Msi and disable updates
In this tutorial will explain how to silent install skype  and disable auto update. The command will uninstall older version of Skype and ...
Read More
Filezilla Silent Install msi and exe version
Filezilla silent install tutorial will explain how to perform a silent installation of application. We will explain methods, silent install ...
Read More
Silent install VLC Media Player
In this tutorial will explain how to silent install VLC Media Player. We will explain both methods for exe and ...
Read More
Notepad++ silent install exe and msi version – Command Line
Notepad++ silent install is the new article from a series of silent installations. Notepad++ as free software has two main ...
Read More

Batch File Solutions

How to list files in cmd – Command Prompt – Windows 10
Whenever you want to search and make a list of all files on a specific folder, you used the windows ...
Read More
Batch rename multiple files in folder – CMD script – Bulk Method – Win 10
The following article will teach how to rename multiple files in a folder with the bulk method using Command Line ...
Read More
Batch script rename file using Command Line (CMD) & PowerShell – Windows 10
The following article will use the “rename” or “ren” command to rename the file using a command prompt. Also, we ...
Read More
Change extension of multiple files at once – CMD batch file
The following article will teach the methods to change the extension of multiple files at once using command prompt and ...
Read More
How to delete registry key with command line | PowerShell | Batch
The following article is the third of series about registry and working on it through command line (CMD) and PowerShell ...
Read More
How to add registry key & values with CMD | PowerShell | Batch
The registry is the place where most of the applications store the settings but not only. Used also from the ...
Read More
Unmap Network Drive CMD – (Batch file) – net use delete command
After we posted the methods to map network drive using cmd commands we come this time with the method to ...
Read More
Map Network Drive cmd (batch file) – net use user password
This article will focus on another way to map a network drive on your computer instead of from the explorer ...
Read More
How to Find Large Files on Windows 7 & 10 – CMD Forfiles Command
If the capacity of your hard drive is running low, it is time to clean off some files and to ...
Read More
CMD Script to check disk space on windows and multiple remote servers
The following article will provide you script to check disk space. The Script monitor space on windows and multiple remote ...
Read More

Get IT Solutions

How to do IT

About Us

Get IT Solutions is a personal blog, which is managed to guide people for various topic.

Second Menu

  • Donate
  • About Us
  • Contact Us
  • Privacy Policy

What Will You Find

Automation is our area of writing where are included scripts, batch and various tips to automate your daily job.
Copyright © 2025 Get IT Solutions