You are here

Ransomware? Have You Heard of It?

Filed Under:
Publication Number: P3086
Updated: June 9, 2017
View as PDF: P3086.pdf

If it looks real, it must be real, right? Well, this is not necessarily the case when it comes to technology. Email addresses can look so real that it is difficult even to the educated eye to see what is wrong. You most likely get a lot of new emails each day. Many of them you can sort through by just looking in your inbox and recognize them as a phishing email or spam.

 

What Is Ransomware?

During the holidays, it is easy to lose track of what you’ve ordered and how items are supposed to be shipped. Often, that is what hackers are hoping will happen, and you can easily fall prey to their “clickbait” trap. Some of the emails delivered to inboxes appear to notify you that a package is being delivered. When you click on the link in the email for the tracking update, your computer becomes infected with ransomware. Ransomware is a type of malware. Specifically, ransomware is a type of malicious software designed to block access to a computer until a sum of money is paid (Rhoades, 2016). There are not many options to block a ransomware attack currently. Ransomware can delete your hard drive completely. It will basically hold your computer files at “electronic gunpoint” (Heater, 2016).

Ransomware comes from Internet connections mostly, but there have been some cases that have involved USB drives. Most cases have been due to the user clicking on a vulnerable link or attachment. Ransomware works quickly, so it will usually infect and possibly encrypt your files before you have time to react.

Ransomware does require you to pay a ransom fee in order to get your files back. They request you use Bitcoins to pay the ransom amount. If your computer is infected with ransomware, you have two options—either pay the amount they ask for or lose your files. If you do not have a backup and you do not intend to pay the ransom, you could lose all your data. So you should ask yourself, “Would it be OK if I lost everything on my computer?” If the answer is no, then you should back up your computer consistently. See MSU Extension Publication 2961 File Backup Options.

It is not recommended that you pay the ransom amount because it encourages the criminals to continue attacking. The importance of always maintaining a backup of your files cannot be stressed enough.

 

How Can I Protect My Device?

The best defense is to not respond or click on any links or emails that you believe are not legitimate. If something appears suspicious, try calling the sender and asking them if they did in fact send you something. Play it safe and check before clicking on an attachment or link. In the event that you do fall victim to an attack, take the following precautions:

  • Unplug network or turn off connections to the Internet.
  • Hold down the power button until the computer shuts down.
  • Unplug the power cord from the computer.

To prevent a ransomware attack:

  • Keep your operating system up to date.
  • Run malware and anti-virus software.
  • Purchase security software.
  • Check twice before clicking on suspicious sites, email attachments, or links.

 

Ransomware is not exclusive to emails; it can also appear as links that you may be tempted to click on through social media sites or even untrusted websites. Once the link is opened, you have started to download the malicious software that encrypts your data. When your files are encrypted, they are converted into another form that cannot be understood by anyone but authorized users.

 

Bitcoins

Is the word Bitcoins new to you? Well, don’t feel left behind. Bitcoin was created in 2009. It is a form of currency that is becoming fairly popular in the Internet world (Zohar, 2015). Bitcoin is an open platform. It is different from a bank in that it is decentralized, whereas a bank is centralized. It isn’t owned by anyone, so anyone can use Bitcoins, similar to email. Bitcoins can best be described as digital coins that can be sent through the Internet. Zohar (2015) stated, “Like cash, it is nearly anonymous, and transactions are effectively irreversible once they are committed.” In big cities, Bitcoin ATMs can be found. It is fairly simple to gain access to this form of currency. To have a Bitcoin account, you create an account online and link it to a debit or credit card. Bitcoins are kept in your digital wallet, which is a cloud-based service. You can purchase anything with them.

This image shows a screenshot of an email with warning signs.

Conclusion

Technology users should always be on the lookout for anything that seems suspicious. Being careless with technology can bring about a world of problems that are not only inconvenient, but also costly. “A computer’s security system is only as effective as the person using it” (Heater, 2016).

 

References

Heater, B. (2016). How ransomware CONQUERED the WORLD. PC Magazine, 109.

Rhoades, G. (2016). Ransomware and other malware. Indexer, 34(3), 126–128.

Zohar, A. (2015). Bitcoin: Under the Hood. Communications of the ACM, 58(9), 104–113. https://doi.org/10.1145/2701411

 


Publication 3086 (POD-06-17)

By Jamie Varner, Extension Instructor, Extension Center for Technology Outreach.


Produced by Agricultural Communications.

Department: Extension Center for Tech Outreach

Contact Your County Office

Authors

Extension Instructor

Your Extension Experts

Extension Instructor
Extension Instructor
Distance Education Coordinator
Assistant Extension Professor
Extension Instructor
Extension Instructor
Extension Instructor

Related Publications

Publication Number: P3085
Publication Number: P3028
Publication Number: p3080

Pages