Ransomware attacks are in the spotlight, and there are no signs that the epidemic will subside. From shutting down oil pipelines to hijacking medical institution networks, ransomware is now the most commonly used means of cyberattacks.
A ransomware attack can make important files and systems inaccessible, which can lead to serious consequences. Moreover, the decision to pay cash is required to recover the data. Moreover, there is no guarantee that the system will be restored even if the requested amount is paid.
This is where the name ransomware comes from, as attackers demand a ransom in exchange for data. There are several patterns of attacks, but usually it's easy to see that it's ransomware. The file will be encrypted (sometimes double encrypted), so you'll need a key to unlock it. Damage can quickly spread to computers and the entire network, and can be completely locked out of a particular system, including other systems in the same network.
Developing and implementing ransomware is not particularly difficult, and you can get money if the attack is successful. Initially, it was targeted at individuals, but eventually companies were targeted, and recently there have been a series of incidents in which government agencies and companies that operate public infrastructure are attacked. In any case, there is a real threat to everyone, but how do you protect yourself?
OS and software updates required
The method of protecting your computer from ransomware is not much different from general anti-malware, and the required rules are similar. First, a ransomware attack would not be possible without access to the system. Attackers then attempt to break into the system, usually through malicious applications. This means that you must be very careful when downloading files of unknown origin via the Internet or email.
Hackers use a variety of social engineering techniques (for example, pretending to be an urgent email from their boss) to install things that shouldn't be installed, or to pretend to be attachments and download files. When you open and run something on your computer, think twice, especially if it arrives without warning.
Even if ransomware is not installed, it may exploit security holes in other software on your computer and deploy it on your own. That's why you should keep as few programs on your PC as possible. When installing, make sure that the developer selects a product that has undergone security updates as appropriate.
In addition to paying attention to the operation of your computer and the programs you install, ransomware also has the golden rules of security: updates, protection, and backups. First, all malware, including ransomware, often exploits old, unupdated software. That's why it's important to keep all programs updated (both macOS and Windows) to keep them up to date.
The OS frequently asks for updates because it's really important. Having the latest updates installed is so important from a security standpoint that most programs automatically process updates in the background. For example, "Google Chrome" will be updated automatically, and if there is an update to be installed, the color of the "Menu" icon on the toolbar will change (it will change from orange to red if the upgrade is urgent).
Antivirus software is effective
When it comes to computer protection, it's essential to have high-quality security software installed, but this should be done regardless of ransomware protection. There is some debate about whether the security features built into the OS are sufficient, but they are very useful in terms of preventing malware threats, including ransomware.
Adding third-party antivirus software to this will make it even more effective. Some of the more famous are McAfee, Norton, Bitdefender, Avira, etc., all of which carefully monitor the system. However, it is up to the user to pay the additional cost (and change the necessary settings) to increase protection.
Ransomware usually targets systems and files on your computer. But if you know your username and password, you can even break into the cloud and encrypt the files there. For this reason, not only should passwords be strong, but also avoid reusing the same passwords (preferably using a password manager).
Also, turn on 2-step verification. That way, when you log in, you'll need additional information (such as the code sent to your smartphone) in addition to your username and password.
Regular backup of data is essential
The third rule to protect yourself from ransomware is to back up your computer and other devices on a regular basis. Whether it's an external hard drive or a cloud sync service, it's okay if you have a copy of the file out of the reach of ransomware.
However, I would like to write one important thing at the end. If the ransomware blocking the files on your computer has access to the backup, the backup will also be encrypted.
To avoid this, at least one of your backups should be set up so that it only occasionally connects to your main system. Alternatively, you can choose a product or service that has the ability to restore files retroactively and restore them to their pre-attack state.
Many cloud backups provide file versioning (for example, Dropbox has a "rewind" feature) that allows you to go back to that point at a specific date and time. This means that you can restore the data to its pre-encrypted state, which is very useful in the event of a ransomware attack. It's a good idea to check the service you are using for details.
As with any security threat, ransomware cannot be 100% protected, but the steps I've written so far minimize the risk. But keep in mind that ransomware attacks are a crime in the worst case. If you are injured, you can report it from the website of the Cyber Security Infrastructure Security Agency (CISA) in the United States [Note: In Japan, the prefectural police have a cybercrime consultation desk].
* Click here for articles related to ransomware attacks by "WIRED".
Business
The biggest reason why the threat does not end even if a hacker group of ransomware attacks is arrested
Business
The threat of ransomware attacks continues: "500 million yen" paid by pipeline operators who succumbed to "ransom" demands
Business
The U.S. pipeline's suspension of operations made the world aware of the threat of ransomware attacks.
INFORMATION INFORMATION
Under recruitment of WIRED Japanese version "membership" members who can also participate in limited events!
"WIRED SZ Membership" is a member service that delivers a selection of long leads (feature articles) packed with insights for the next 10 years according to weekly themes. The exciting service, which can participate in the weekly members-only event, is running a one-week free trial!Click here for details