Categories: Security

If a Ransomware Attack Happens to You, Should You Pay?

Just imagine: you try to open the screen on your phone, hoping to message a friend and suddenly a note pops up on your screen. It says your files have been encrypted, and you can’t access them unless you pay hundreds of dollars. To prevent this scenario, you should back up your files and avoid suspicious links and downloads. Further, you should regularly scan your device for malware. Click here to use security scan to quickly remove hidden security threats to ensure you are never a victim of ransomware:


Ransomware is a lot like scareware — it gains access to your computer when you click on infected popup ads or websites. Unlike scareware, though, ransomware restricts users’ access to their own data, making people panic and think they have no choice but to pay up. If you’re a victim of ransomware, here are some steps to take.

Read More: Ransomware Attacks Are Increasing on Android

Should You Pay the Ransom?
On the one hand, hackers usually return stolen data if the ransom is paid since they want to maintain an incentive for paying. On the other hand, cooperating shows hackers that you’re an easy target, often leading to future attacks. The government tends to advise against paying ransoms because it benefits the ransomware “business model” by encouraging hackers to keep launching ransomware attacks.

Determine the Type
There are two main types of ransomware: encrypting and screen-locking. If you can’t open files such as documents, photos, and emails, but you can still browse the Internet and use apps, this is encrypting ransomware. If your computer or phone is stuck on the ransom note and you can’t use it at all, it’s screen-locking ransomware. On the other hand, if you can use your device normally and access most of your files, the ransomware is probably fake, and you can ignore the attack.

Encrypting Ransomware
This is the most common and, unfortunately, the most malicious kind of ransomware. First of all, if your computer is infected disconnect if from any other devices, and go offline to prevent the virus from spreading to other devices. Next, use antivirus software to remove the ransomware. This will not let you access the encrypted files, but it will stop the ransomware from encrypting more files. To recover deleted files and access encrypted ones, use online tools designed for that purpose. There are many available, both free and paid, so do some research, and use more than one if necessary. If you don’t want to handle it alone, take it to a computer specialist to help decrypt your files.

Screen-Locking Ransomware
This type is easier to handle than encrypting ransomware. Still, you’ll want to disconnect from other devices and go offline. Then, press the power button and the “S” key at the same time — this will put your computer in Safe Mode. Next, run antivirus software to eliminate the ransomware.

Finally, if you’re a victim of ransomware, remember that this is a crime and should be reported to the Internet Crime Complaint Center (IC3). The IC3 reviews the complaint and forwards relevant information to local or federal authorities. Stand up to hackers by reporting and don’t just wipe the device clean.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

How to identify a spy app on your smartphone

In the United States, the use of spyware apps is a growing concern, affecting mobile…

56 years ago

5 trending digital scams: how AI is making fraud more dangerous

Every day, millions of mobile phone users receive malicious links through SMS, email, or social…

56 years ago

Pix Gains Momentum Abroad: Convenience and Security for Brazilian Travelers

Travel is about new experiences — and making payments without hassle is a crucial part…

56 years ago

Malicious links: what they are and how to protect yourself

Every day, millions of  cell phone users receive malicious links via SMS, email, or social…

56 years ago

Zero Trust: what it is, why it matters, and how dfndr security protects your phone with this concept

Have you heard of Zero Trust? The term is one of the most  important trends…

56 years ago

5 Reasons to Use Biometrics to Secure Mobile Devices

Mobile devices have become essential tools in both our personal and professional lives, but they…

56 years ago