Protect Yourself From Ransomware‬

Protect Yourself From Ransomware‬

Protect Yourself From Ransomware‬

Protect Yourself From Ransomware‬

How are the distributions distributed?

  • Malicious email campaigns , with attachments in Word or JavaScript format. In the latter case, disabling Windows Script Hosting is recommended: How to protect yourself from malicious scripts on Windows . Note that some campaigns are in French, such as, for example, using Free Mobile emails
  • Web Exploits, designed to infect a computer by taking advantage of up-to-date software (including Web browser plug-ins), are more likely to affect Internet Explorer users. In order not to be vulnerable, it is strongly recommended to keep your software up-to-date.
  • Servers are also targeted through RDP bruteforce attacks seeking administrator accounts with low pass mtos.

The following video presents a simulation of contamination by a ranking on a test machine. First you are shown that the machine is up to date with the latest security updates from Microsoft Windows, Java or Adobe, and then the researcher opens a remote Web site that performs the attack on the victim machine. Do not test these things on your computer, the purpose of these videos is to show you what this type of attack looks like.

The next video is a bit more complex. It shows you how malware can be launched on a simple Web site visit – when add-ons / plugins are not up to date and have vulnerabilities. It is a fake antivirus (scareware) that one gets. The principle for storing the software remains the same. In the video, performed on a test computer, you will see both the scanning tools used to observe this malware and the mainstream browser used.

Or even below, a video that shows the infection with a Word / Excel document – Trojans JavaScript sent zipped emails are also very active.
The Marmiton program protects them.

Some good rules to follow?

The rules for protecting themselves against computerized routines as well as for all computer virus infections today are the following:

  • Keeping your computer up to date :
    • The operating system (allow automatic updates)
    • All your software and in particular Internet browsing software or e-mail consultation
    • Additional software or plugins and in particular those that allow to display animations Java, Flash or even PDF files
  • Installing software antivirus and keep it updated: there are paid solutions like free. Check with an antivirus any removable media (USB key in particular) of unknown origin.
  • Do not click on links from unknown sources (such as unsolicited e-mails or social networking messages from unknown contacts or the usual way to contact you).
  • Make backups of your most important files : on a removable hard disk, on CD-ROMs or on sharing disks on the Internet.

If you have been infected with a virus, for example after following the cleaning procedure proposed for the software , consider changing the passwords of your different applications on the Internet (e-mail – including webmails, instant messaging, social networks , Online banking, FTP …).

Additional tips

To help you keep your computer, tablet / phone software up to date.
On Windows, you can check the latest versions of the applications with Secunia Personal Software Inspector or  Hippo Update Checker .

Block the malicious scripts with Marmiton .
Block malicious sites with Blockulicious .

The most cautious users add to their browser various protection options, such as the NoScript extension (  for Firefox or  Notscripts  or  Scriptno  under Chrome) that allow you to have a launch site-by-site control Scripts included in Web pages.