I have been warning you about the dangers of ransomware since 2012. Ransomware problems begin when you find your computer frozen and a message on your screen tells you that your computer will remain frozen until you pay a “ransom.” CryptoWall and its predecessor CryptoLocker ransomware have been used effectively by criminals for years. The most recent version of ransomware being used is called Tescrypt. Companies, government agencies and individuals have all been the targets of ransomware. In fact, a number of police departments, including the Swansea Massachusetts police department have been the victims of ransomware and actually paid the ransom. More recently, the town of Medfield, Massachusetts paid a bitcoin ransom equal to approximately $300 to a hacker who used ransomware to encrypt and lock the municipalities computer network. Just a couple of weeks ago the computer system of the Hollywood Presbyterian Medical Center in California had its computers locked and encrypted by ransomware and the hospital ended up paying a ransom of 50 bitcoins (approximately $16,664) to get back access to its computers.
Until now, the problem of ransomware was limited to the Microsoft Windows operating system, but now security firm Palo Alto Networks has announced that it has discovered the first time that ransomware malware was written for and deployed among users of Apple’s Mac operating system leaving Mac users who had long felt less threatened by ransomware to suddenly feel vulnerable. The ransomware presently being circulated among Mac users has been called KeRanger and it was downloaded on to unsuspecting users of Transmission, a legitimate BitTorrent file-sharing application. Apple has remedied this particular ransomware problem at Transmission, however, the genie is now out of the bottle and there is every reason to believe that there will be more incidents of ransomware attacking Mac users.
The best way to deal with ransomware is to avoid it in the first place. Have a good firewall, good anti-virus and good anti-malware software installed on your computer, tablet or other devices and keep the software up to date. However, remember that the security software companies are always playing catchup with hackers, so your security software will not always protect you. The latest incarnations of most malware is generally at least thirty days ahead of the security software companies so you can never rely on your security software and your firewall to keep you totally safe. However, make sure that when security updates are available that you download them as soon as possible. Many people become victims of older versions of ransomware because they have not updated their security software. Also, you should always back up everything on your computer in the Cloud or on a USB drive or preferably both so if you do become a victim of ransomware, you will not have to pay the ransom because you have already protected your files.. Finally, never click on links or download attachments unless you are absolutely positive that they are legitimate and the only way to do this is to confirm that they are legitimate with the real companies you think may be sending you the email before ever clicking on a link or downloading an attachment.
If you are a victim of ransomware, here are a couple of free links that may help you. The first is a link to Microsoft’s Malware Protection Center with links and instructions for removing ransomware infections from your computer: http://www.microsoft.com/security/portal/shared/ransomware.aspx#recover. The second is to Malwarebytes Anti-Malware which will detect and remove malware such as trojans and spyware. The link is www.malwarebytes.org. Some types of ransomware cannot be defeated after they are installed, but it is always worth a try.