How do you know making ransomware payments will work?

Preventing Ransomware is easier than removing it

Malicious software hit Britain’s National Health Service as well as companies in Russia, Spain, Ukraine and Taiwan.

The co-ordinated attack infected computers across the NHS in less than six hours, spreading from one PC to the next within networks across the UK.

The ransomware uses a vulnerability in Windows PCs to encrypt data. Hackers then demand payments to decrypt the files.

The first infected computer contacts a central server and encrypts files on the network. A message threatening to destroy your data is sent with a countdown timer attached to increase your fear of loss.

Ransomware is hidden within Word documents, PDFs and other files sent via email.

A secondary infection seeps into computers, opening for further attacks.

Preventing ransomware is easier than removing it.

Malware that affected Spain and the UK was the same. Security researchers detected it at 9.45am on 12 May.

The original ransomware spread laterally throughout the NHS from Blackpool across the UK in less than four hours.

This weakness was revealed as part of a huge leak of NSA hacking tools.

Sometimes paying the ransom will work. Sometimes it will not. There is no guarantee making payment will work as cybercriminals are not trustworthy.

Protecting your data is critical. Seek support from highly skilled IT experts who live and breathe data security. Actively engage with certified engineers who relish the challenge of staying one-step ahead of cyber criminals. Fifosys proudly provide 24/7 elite level IT Solutions and Support Services.

Huw Tremlett

Data Management Consultant

Huw Tremlett