{"id":15237,"date":"2017-11-09T18:00:47","date_gmt":"2017-11-09T23:00:47","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=15237"},"modified":"2022-04-28T23:44:43","modified_gmt":"2022-04-29T03:44:43","slug":"if-a-ransomware-attack-happens-to-you-should-you-pay","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/if-a-ransomware-attack-happens-to-you-should-you-pay\/","title":{"rendered":"If a Ransomware Attack Happens to You, Should You Pay?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Just imagine: you try to open the screen on your phone, hoping to message a friend and suddenly a note pops up on your screen. It says your files have been encrypted, and you can\u2019t access them unless you pay hundreds of dollars. To prevent this scenario, you should back up your files and avoid suspicious links and downloads. Further, you should regularly scan your device for malware. Click here to use security scan to quickly remove hidden security threats to ensure you are never a victim of ransomware:<\/span><\/p>\n<p><center><a href=\"https:\/\/app.appsflyer.com\/com.psafe.msuite?pid=MKT_BLOG_US&amp;c=ransomware_attack_should_you_pay\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-9829 size-full\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg\" alt=\"\" width=\"353\" height=\"79\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1.jpg 353w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2017\/04\/run-security-scan-1-300x67.jpg 300w\" sizes=\"auto, (max-width: 353px) 100vw, 353px\" \/><\/a><center><\/center><\/center><span style=\"font-weight: 400;\"><br \/>\nRansomware is a lot like scareware \u2014 it gains access to your computer when you click on infected popup ads or websites. Unlike scareware, though, ransomware restricts users\u2019 access to their own data, making people panic and think they have no choice but to pay up. If you\u2019re a victim of ransomware, here are some steps to take.<\/span><\/p>\n<p><b>Read More: <\/b><a href=\"https:\/\/www.psafe.com\/en\/blog\/ransomware-attacks-increasing-android\/\"><b>Ransomware Attacks Are Increasing on Android<\/b><\/a><\/p>\n<p><b>Should You Pay the Ransom?<br \/>\n<\/b><span style=\"font-weight: 400;\">On the one hand, hackers usually return stolen data if the ransom is paid since they want to maintain an incentive for paying. On the other hand, cooperating shows hackers that you\u2019re an easy target, often leading to future attacks. The government tends to advise against paying ransoms because it benefits the ransomware \u201cbusiness model\u201d by encouraging hackers to keep launching ransomware attacks.<\/span><\/p>\n<p><b>Determine the Type<br \/>\n<\/b><span style=\"font-weight: 400;\">There are two main types of ransomware: encrypting and screen-locking. If you can\u2019t open files such as documents, photos, and emails, but you can still browse the Internet and use apps, this is encrypting ransomware. If your computer or phone is stuck on the ransom note and you can\u2019t use it at all, it\u2019s screen-locking ransomware. On the other hand, if you can use your device normally and access most of your files, the ransomware is probably fake, and you can ignore the attack.<\/span><\/p>\n<p><b>Encrypting Ransomware<br \/>\n<\/b><span style=\"font-weight: 400;\">This is the most common and, unfortunately, the most malicious kind of ransomware. First of all, if your computer is infected disconnect if from any other devices, and go offline to prevent the virus from spreading to other devices. Next, use antivirus software to remove the ransomware. This will not let you access the encrypted files, but it will stop the ransomware from encrypting more files. To recover deleted files and access encrypted ones, use online tools designed for that purpose. There are many available, both free and paid, so do some research, and use more than one if necessary. If you don\u2019t want to handle it alone, take it to a computer specialist to help decrypt your files.<\/span><\/p>\n<p><b>Screen-Locking Ransomware<br \/>\n<\/b><span style=\"font-weight: 400;\">This type is easier to handle than encrypting ransomware. Still, you\u2019ll want to disconnect from other devices and go offline. Then, press the power button and the \u201cS\u201d key at the same time \u2014 this will put your computer in Safe Mode. Next, run antivirus software to eliminate the ransomware. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Finally, if you\u2019re a victim of ransomware, remember that this is a crime and should be reported to the <\/span><a href=\"https:\/\/www.ic3.gov\/default.aspx\"><span style=\"font-weight: 400;\">Internet Crime Complaint Center<\/span><\/a><span style=\"font-weight: 400;\"> (IC3). <\/span><span style=\"font-weight: 400;\">The IC3 reviews the complaint and forwards relevant information to local or federal authorities. Stand up to hackers by reporting and don\u2019t just wipe the device clean.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>They seem too malicious to be true, but ransomware attacks are unfortunately a growing phenomenon. Here\u2019s what to do if your device is held hostage.<\/p>\n","protected":false},"author":83,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[5],"tags":[1203,4328,195,358,249],"class_list":["post-15237","post","type-post","status-publish","format-standard","hentry","category-security","tag-android-phone","tag-antivirus-protection","tag-app5","tag-protection","tag-security"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/15237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=15237"}],"version-history":[{"count":2,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/15237\/revisions"}],"predecessor-version":[{"id":18849,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/15237\/revisions\/18849"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=15237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=15237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=15237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}