What is a ransomware attack?

Imagine having to pay to access the files on your own device. That’s how bad ransomware attacks are. Find out below what ransomware is and how you can protect yourself.

How do ransomware attacks work?

Ransomware encrypts all the files on your device so that you can’t access them without a decryption key. It can also lock your device completely. Criminals then demand a ransom fee of typically $300 to $500 in Bitcoin per device in exchange for the ransomware decryption key.

How can ransomware infect my device?

Computer viruses, what different ransomware types are, have to be downloaded manually by accident or automatically by another malware. Ransomware can be downloaded from email attachments, compromised or malicious websites and ads, or unsafe Wi‑Fi networks. Other malware can also download ransomware without you knowing.

Can ransomware infect my mobile phone?

Yes. Mobile ransomware exists for both iOS and Android devices. What’s worse, it’s a growing threat because of the huge amount of people using smart devices.

Is ransomware removal possible?

Ransomware removal can be tricky and sometimes even impossible after it’s on your device. That’s why ransomware protection starts with trustworthy antivirus software that prevents ransomware from infecting your device. You can also prepare by taking regular backups so if you get attacked, you can restore from backups.

How can I get my files back?

Paying the ransom doesn’t guarantee that you will get your files back. You can check if there is a decryption tool for the ransomware you’ve been attacked with. You can check from help forums like Bleeping Computer for help with many different types of ransomware.

5 simple anti-ransomware tips

  • Make sure you’re running an effective internet security program on all your devices.
  • Take regular backups of your data. Store them offline so they can’t get infected.
  • Keep your software and operating systems up to date. Enable automatic updates to always have them updated.
  • Be skeptical of email links and attachments. Type links into your browser rather than clicking from the email. Be extra careful with attachments requesting you to enable or allow something — macros, editing, content, etc.
  • Disable commonly exploited browser plugins such as Flash Player and Silverlight when you’re not using them. You can do this through your web browser under the plugin settings.

Do you want the best ransomware protection?

Ransomware removal is harder than ransomware prevention. F‑Secure SAFE is an award-winning antivirus software for all devices. It doesn’t only protect your devices from ransomware attacks and viruses, it also includes banking and browsing protection functions to keep your money safe. You can try it for free, with no credit card required.