Ransomware attack: 7 easy things to do after it took place

ATTACK Simulator
2 min readJul 20, 2021

Have you fallen for a ransomware attack? Unfortunately, it can happen to anyone, so try to stay calm and follow some simple steps to maintain the security of your devices.

Ransomware attacks can be delivered through emails.

According to Wikipedia, Ransomware is a “type of malware from cryptovirology that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion.”

1. Make sure the ransomware attack is real

As ridiculous as it may seem, it may happen that you haven’t been infected yet and you’re just worried. When your computer shows a ransom message, the threat is more than obvious. In many cases, however, it may seem difficult to identify the attack.

Keep in mind that opening an infected email and reading it won’t affect your computer. However, downloading and opening attachments can put your computer at risk.

It’s important to train your staff who regularly receive external messages about the risks behind emails. Our Cyber Security Awareness Training program helps your employees to always be prepared for cyberattacks.

Only by taking cybersecurity seriously, you can be always prepared for all the online challenges that are just one click away from you.

2. Disconnect the affected device from the Internet

Did the worst thing happened and is your device is the victim of a phishing attack? Then it’s essential to cut off the Internet connection. If you’re using a wireless connection, turn it off. If you’re using an Ethernet cable, unplug it asap.

3. Scan your computer for viruses

If you’re suspicious of a potential ransomware infection, it’s crucial to scan your computer for viruses. You should start a full system scan even if your computer is slower than usual or acting strangely. Use a virus scanner to identify the malicious files. For Windows, you can use the free antivirus Windows Defender, and for Mac, there is a free version of Malwarebytes. We recommend investing in advanced antivirus software from reputable brands like Bitdefender or Norton.

Read the rest on our website for free.

--

--

ATTACK Simulator

We’re a fresh startup that aims at creating a culture of security in every company by teaching security awareness through automated phishing simulations.