When we think of ransom, we think of an old movie with a kidnapper leaving notes made from newspaper cuttings. Today, ransom is much less melodramatic, much more common and targets something you might not expect: your computer files.
A ransomware threat is yet another thing that can kill your computer, alongside bugs and crashes. Hackers made a new bug that can take over a computer, encrypt all its files and display a message demanding money to decrypt them. Sometimes, affected companies or individuals would pay up, and the hacker would decrypt the computer as promised. Victims would sometimes refuse to pay the fees in the given time and would then lose their valuable files forever. And sometimes, victims would fork over the cash, only to have the hackers disappear with the files still locked and therefore as lost as before the victims paid up.
One study estimates that in its first 100 days as a scheme, ransomware infected 250,000 computers. It earned the hackers a collected $6 million in bitcoins. If that trend continued, we can expect that they’ve hacked at least 24 million computers in the past two years, including one major hospital that reportedly forked over $17,000 to get its files back.
Many ransomware copies continue to wreak havoc. The program continues to evolve, now locking computers and displaying menacing countdowns to create a heightened sense of urgency to pay up.
The question now, of course, is what you should do to protect yourself. For starters, if the only computer you have is private, ransomware is a less significant risk. Ransomware scammers tend to target computers of companies that have the capability to hand over large sums of money. If your computer handles the larger functions of a company, there are still some steps you can take to protect yourself.
1.) Don’t trust online solutions for ransomware
For starters, there are many software programs that promise to completely rid your computer of ransomware. However, some of those alleged file-saving downloads are actually ransomware in disguise. Your best bet is to back up your files onto an external hard drive, another computer or on paper. Anything you do will ensure that, when the hackers come, you’ll already have those encrypted files elsewhere. It’s advisable to check at least once a month and back up your files if necessary.
2.) Hold onto your money
While it might seem like the only option to get your files back, the FBI has asked people not to pay ransoms. If you pay hackers, they have more incentive to continue, and payment really doesn’t influence whether they decrypt your files or not. “The FBI does not condone payment of ransom, as payment of extortion monies may encourage continued criminal activity, lead to other victims, or be used to facilitate serious crimes,” as FBI Special Agent Christopher Stangl elaborates in an interview. If you’re desperate for your files, paying may seem like the only option, but consider the difference that could be made if no one paid them anymore. Crime syndicates would be stopped without any work from the FBI.
3.) Call the cops, but don’t hold your breath
Many are currently asking whether the FBI has done anything significant to this point. This includes Sen. Ron Wyden, who wrote to James Comey, former FBI director, to ask how the agency intended to clean up the ransomware problem. Comey responded that they were making progress, but pointed out that making arrests wasn’t easy as “most of the top cybercriminal actors are located outside of the United States.” Still, he went on to assure Wyden that, “The FBI is committed to following the money in investigating all crimes with a financial component; ransomware is no exception.”
4.) Back up and stay safe from ransomware
While the FBI has its best people catching these cyber culprits, it’s your responsibility to be as safe as possible until they do. Back your files up. Don’t click on any sketchy-looking links. Buy security that a trusted provider assures you is safe. Ransom is no longer a thing of black-and-white movies; but in the digital age, it’s still our job to protect ourselves.
If you like what you read, then join our e-mail list!