How to fight against ransomware?

Share if you likedShare on Facebook0Share on Google+3Tweet about this on TwitterShare on LinkedIn15

Ransomware is computer malware that installs covertly on a victim’s device (e.g., computer, smartphone, wearable device). It’s an exploit in which the attacker encrypts the victim’s data and requests payment for the decryption key. This kind of malware forces the victims to pay the hacker through online payment methods in order to grant access to their systems or to get their data back.

The best strategies you can do to protect against ransomware should include the following:

1. User awareness is the key to preventing ransomware attacks. For example, educate users against phishing emails, suspicious websites, and other scams.

2. Keep the systems and Softwares up to date.

3. Limit administrator privileges and restrict the scope of access for certain user roles.

4. Take frequent backups and store them offline because a lot of ransomware will spread through drive shares and can even reconnect a disconnected drive share.

5. Use network segmentation to reduce the network attack surface.

6. Disable Remote Desktop feature, malware operators have come to massively use Windows native remote access feature and third-party software to drop malicious code onto computers.

7. Use advanced security threat intelligence tools. It can be used to identify IP addresses of known sites. Blocking these sites can probably prevent ransomware.

Ransomware infections are so popular these days. Until now, there is no effective way that would keep users fully protected against this kind of malware. One way or another, prevention is definitely better than medicine, the steps above are free and easy to follow. Good luck.

Share if you likedShare on Facebook0Share on Google+3Tweet about this on TwitterShare on LinkedIn15

Eslam Medhat

is a professional pen-tester with over 9 years of IT experience bringing a strong background in programming languages and application security, ranging from network and system administration to exploit research and development. He reported various vulnerabilities for high profile companies and vendors and was successfully acknowledged by them.

Leave a Reply