So your security provider failed you, and you were a victim of ransomware. What do you do now?
It is likely you have a ransom note on your screen stating what you need to pay, and how to do it. What they don’t tell you is just how difficult that will be. Often times hackers will try and make it as easy as possible for you to send them money — but they also want it to remain anonymous. Therefore, users will have to convert their dollars into a digital, non-traceable currency, like bitcoins.
But How?
Do you know how to do this? The process isn’t too difficult, but it can be time consuming. Many legitimate websites like CoinBase, require an authentication process. You’ll need to register, and provide your banking information for the transfer of funds. Once the authentication process is complete, the transfer and conversion will take place. Again, this takes time.
Another method would be to find your nearest bitcoin ATM. This not only allows for instant conversion, but everything remains anonymous as well. However, this comes with a significant price tag, with fees based on geographical areas. You’ll also need to determine which services are provided at the ATM, some offer only the option to buy crypto-currencies, while others allow you to also sell.
If you’re like me, and your local bitcoin ATM only allows you to buy bitcoins, for the “small” fee of 12%, you will still need to find a way to send them to the hacker.
Now I’m going to stop right there. Why? Because this sounds like a ridiculous amount of work, and you’re not even halfway there! If you pay the ransom demands, you have to wait for the encryption key — assuming the cyber criminals even give it to you. Then it becomes your job to decrypt all of the files they locked.
How about instead of all this, you focus on preventing the ransomware attack and keeping timely data backups.
To actively thwart ransomware, users are encouraged to do the following:
- Implement a security solution that utilizes application whitelisting technology
- Ensure all programs, including the operating systems, are patched timely
- Disable macros and unused remote access ports
- Complete cyber security training (this is offered free to all PC Matic customers)
Preventing cyber attacks is not impossible, but does require a proactive approach.