{"id":13592,"date":"2016-12-12T08:59:49","date_gmt":"2016-12-12T13:59:49","guid":{"rendered":"https:\/\/www.kaspersky.com.au\/blog\/?p=13592"},"modified":"2019-11-15T22:46:21","modified_gmt":"2019-11-15T11:46:21","slug":"ransomware-for-dummies","status":"publish","type":"post","link":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-for-dummies\/13592\/","title":{"rendered":"What is ransomware?"},"content":{"rendered":"<p>This post is intended for people who either never heard of ransomware or knew about it but didn\u2019t really pay attention. We will explain in practical, down-to-earth language what ransomware is. Along the way we will also cover why even careful users need to fear ransomware, and how to take proper measures to protect yourself against this type of malware.<\/p>\n<h3>What is ransomware?<\/h3>\n<p>Ransomware is a type of malware that has made fast strides and is now unbelievably pervasive. It comes in <a href=\"https:\/\/www.kaspersky.com.au\/blog\/ransomware-blocker-to-cryptor\/\" target=\"_blank\" rel=\"noopener noreferrer\">two major types<\/a>: cryptors and blockers.<\/p>\n<p>Having infected a computer, cryptors encrypt valuable data, including documents, photos, game saves, databases, and so on. Once they\u2019re encrypted, the files cannot be opened, and a user cannot access them anymore. The criminals behind the attack then demand ransom in exchange for the encryption key to restore access to the files. Ransom averages about $300.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/12\/06021056\/average-ransom-300-en-1.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/12\/06021056\/average-ransom-300-en-1.jpg\" alt=\"What is ransomware?\" width=\"1135\" height=\"840\" class=\"aligncenter size-full wp-image-13594\"><\/a><\/p>\n<p>Blockers are so named because they block access to the infected device, which means not only are the victim\u2019s files inaccessible, the entire system is. The ransom demand for a blocker is usually not as large as for a cryptor.<\/p>\n<h3>Why you need to know about ransomware<\/h3>\n<p>First, ransomware programs are both abundant and prominent. They target all operating systems, such as Windows, Mac OS X, Linux, and Android, which means they can affect desktop computers and mobile devices. The majority of ransomware programs target Windows and Android.<\/p>\n<p>It\u2019s also quite easy to get infected. Most commonly, ransomware infiltrates a computer when a user opens a malicious attachment, clicks on a suspicious link, or installs apps from third-party app stores. However, ransomware can come from legitimate websites: Lately, for example, cybercriminals have been <a href=\"https:\/\/www.kaspersky.com.au\/blog\/advertising-svpeng\/13423\/\" target=\"_blank\" rel=\"noopener noreferrer\">using advertising networks<\/a> to deliver malware to users.<\/p>\n<p>Alas, it is also pretty easy to fool lots of users into thinking they are opening or downloading something important \u2014 like a letter from a bank or a critical program installer \u2014 when instead, they are infecting their own devices with ransomware.<\/p>\n<p>Arguably, the main issue with ransomware is that removing the malware does not solve the problem. A good antivirus program, and even some targeted utilities, can typically remove ransomware effectively. But if the malware encrypted your files, you have to decrypt them to get access back.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/Vkjekr6jacg?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>Moreover, paying ransom is troubling on several levels. First, you may not have the money available. Second, paying motivates cybercriminals to continue with their attacks. Third and perhaps most compelling, you can never be sure that paying ransom will actually solve the problem. According to our research, 20% of victims who paid <a href=\"https:\/\/www.kaspersky.com.au\/blog\/no-no-ransom\/\" target=\"_blank\" rel=\"noopener noreferrer\">never got their files back<\/a>. That should come as no surprise, criminals being criminals. You can\u2019t expect fair play from them.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/12\/06021054\/no-no-ransom-ig-en-2.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/102\/2016\/12\/06021054\/no-no-ransom-ig-en-2.jpg\" alt=\"What is ransomware?\" width=\"1280\" height=\"840\" class=\"aligncenter size-full wp-image-13595\"><\/a><\/p>\n<h3>How to decrypt files<\/h3>\n<p>If ransomware managed to get inside the system and encrypt your files, you will not be able to decrypt the files on your own. You have, in essence, two options. You could capitulate and pay the ransom \u2014 which, for the reasons above, we do not recommend.<\/p>\n<p>The better option is to visit <a href=\"http:\/\/noransom.kaspersky.com\" target=\"_blank\" rel=\"noopener noreferrer\">noransom.kaspersky.com<\/a> and see if we have a decryptor that can decrypt your files. Our decryption tools are available free of charge, although we do not yet have a tool for every crypto-ransomware.<\/p>\n<p>With that said, you don\u2019t have to wait until something bad happens, so go ahead and take preemptive measures.<\/p>\n<h3>How to protect yourself from ransomware<\/h3>\n<ol>\n<li>Don\u2019t open suspicious e-mail attachments, don\u2019t visit murky websites, and don\u2019t download programs from any sites other than official developer websites and app stores. Learn to spot <a href=\"https:\/\/www.kaspersky.com.au\/blog\/phishing-ten-tips\/10550\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing messages<\/a>, and do not click on their links.<\/li>\n<li>Do back up regularly. If your files are stored on both PC and external drives or in the cloud, you can just use your antivirus program to remove the ransomware and then restore your files from backup copies.<\/li>\n<li>\nInstall a good antivirus program. Check out <a href=\"https:\/\/www.kaspersky.com.au\/plus?icid=au_bb2022-kdplacehd_acq_ona_smm__onl_b2c_kdaily_lnk_sm-team___kplus___\" target=\"_blank\" rel=\"noopener\">Kaspersky Plus<\/a>, which has a unique \u201cSystem watcher\u201d feature that provides essential protection against ransomware. By the way, in recent independent benchmark tests, Kaspersky Internet Security <a href=\"https:\/\/www.kaspersky.com.au\/blog\/effitas-certification\/13329\/\" target=\"_blank\" rel=\"noopener noreferrer\">fought off 100%<\/a> of the ransomware testers threw at it.<\/li>\n<\/ol>\n<input type=\"hidden\" class=\"category_for_banner\" value=\"kis-trial-ransomware\">\n<p>A few weeks ago, we provided more <a href=\"https:\/\/www.kaspersky.com.au\/blog\/ransomware-faq\/\" target=\"_blank\" rel=\"noopener noreferrer\">extensive coverage<\/a> of different types of ransomware and their nature and origins. Now that you\u2019re up to speed on ransomware, check out that post for more information and a handful of useful tips to protect yourself from ransomware. And stay in the loop with <a href=\"https:\/\/www.kaspersky.com.au\/blog\/tag\/ransomware\" target=\"_blank\" rel=\"noopener noreferrer\">our news<\/a> to learn about the newest strains of ransomware as they emerge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is ransomware? Why do you need to know about it? And how can you protect yourself from it?<\/p>\n","protected":false},"author":40,"featured_media":13593,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[2646,9],"tags":[1878,420,97,422,723],"class_list":{"0":"post-13592","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"category-tips","9":"tag-in-simple-words","10":"tag-ransomware","11":"tag-security-2","12":"tag-threats","13":"tag-trojans"},"hreflang":[{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-for-dummies\/13592\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-for-dummies\/5750\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-for-dummies\/4007\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-for-dummies\/10569\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/ransomware-for-dummies\/8141\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/ransomware-for-dummies\/8702\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-for-dummies\/9661\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-for-dummies\/9455\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-for-dummies\/13579\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/ransomware-for-dummies\/2713\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-for-dummies\/13592\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-for-dummies\/6448\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/ransomware-for-dummies\/6790\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/ransomware-for-dummies\/9367\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-for-dummies\/13421\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-for-dummies\/13579\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-for-dummies\/13592\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.com.au\/blog\/tag\/ransomware\/","name":"Ransomware"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/13592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/comments?post=13592"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/13592\/revisions"}],"predecessor-version":[{"id":24362,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/posts\/13592\/revisions\/24362"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media\/13593"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/media?parent=13592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/categories?post=13592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.com.au\/blog\/wp-json\/wp\/v2\/tags?post=13592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}