How to tell if you’ve been hit by fake ransomware

By April 29, 2016Bitcoin Business

Unlike most malware, ransomware is not stealthy. It’s loud and obnoxious, and if you’ve been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.

“Your personal files are encrypted,” the message on the computer blares. “Your documents photos, databases, and other important files have been encrypted with strongest encryption and unique key, generated for this computer.” While the language may vary, the gist is the same: If you don’t pay the ransom — typically within 48 to 72 hours — your files are hosed. [ Oh no! Got real ransomware? Then one of these tools might help . | 4 reasons not to pay up in a ransomware attack . | Safeguard your data! The tools you need to encrypt your communications and Web data . ] Or are they? There is a slim possibility the perpetrators may be trying to fake you out and the files haven’t been encrypted. While not a common scenario, it does happen, according to industry experts. Rather than paying up, you can bypass the scary fake message and move on with your day.

“There are a number of examples where true encryption doesn’t occur. Instead, cyber criminals rely on the social engineering edge of the attack to convince people to pay,” warns Grayson Milbourne, director of security intelligence at Webroot. Is it real or fake?

It takes only a few seconds to confirm whether it’s a real infection or a social engineering scam.

If the ransom demand includes the name of the ransomware, then there’s no mystery, and you’re in trouble. Ransomware families that identify themselves include Linux.Encoder — the first Linux-based ransomware — which clearly says “Encrypted by Linux.Encoder.” CoinVault identifies itself by listing the support email address. TeslaCrypt and CTB-Locker are also among the well-known […]

Leave a Reply

All Today's Crypto News In One Place