{"id":20614,"date":"2021-05-30T16:57:00","date_gmt":"2021-05-30T20:57:00","guid":{"rendered":"https:\/\/www.psafe.com\/en\/blog\/?p=20614"},"modified":"2022-04-27T14:48:22","modified_gmt":"2022-04-27T18:48:22","slug":"ransomwares","status":"publish","type":"post","link":"https:\/\/www.psafe.com\/en\/blog\/ransomwares\/","title":{"rendered":"Ransom Scams On The Rise"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">We\u2019ve been writing quite a bit about the rise we\u2019ve seen in Coronavirus related scams and malware, but in the midst of this uptick, another disturbing trend has continued to grow: scams that ask for ransoms from users.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cUnfortunately, one of the traits of the hacking community is relentlessness,\u201d explains Emilio Simoni, Research Director at <strong>dfndr lab<\/strong>, \u201cthere are always multiple scams being run and the sheer volume and variety of them works to the hackers\u2019 advantage.\u201d Simoni continues: \u201cWith the worldwide and individual attention given to coronavirus, we\u2019re of course seeing many scams of this type, but this kind of focused attention creates an opening for other types of scams to flourish. Ransomware scams are some of the worst, because of the potential financial damage for frightened users \u2014 so of course this threat requires that users be alert and take appropriate steps.\u201d<\/span><\/p>\n<p><a href=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-20628\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126-233x300.jpg\" alt=\"\" width=\"233\" height=\"300\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126-233x300.jpg 233w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126-768x991.jpg 768w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126-794x1024.jpg 794w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2020\/04\/facebook_1586635255126.jpg 1068w\" sizes=\"auto, (max-width: 233px) 100vw, 233px\" \/><\/a><\/p>\n<h3>How Do Ransomwares Operate?<\/h3>\n<p><span style=\"font-weight: 400;\">Typical ransomware scams operate on social media or via email.&nbsp; On social media, users will deploy malware links on a post from a hacked or \u201cspoofed\u201d (fake) account, and unwary users will unthinkingly follow links provided by people they believe they know. Simoni explains, \u201cOne of the hallmarks of these scams is the use of a fake-account as a kind of mask &#8212; creating trust and trapping those who simply click without thinking.\u201d Some of the malware used in these scams will freeze your hard drive or lock you out of needed files or folders: this is why it\u2019s crucial to have a regular backup routine for your machine.<\/span><\/p>\n<p><b>Another common ransomware scam involves the threat of revealing potentially embarrassing information, <\/b><span style=\"font-weight: 400;\">often using messages that refer to popular porn sites and claim the possession of compromising material and information.&nbsp; An example of a ransom note of this type appears below:<\/span><\/p>\n<h3><b>What Should You Do If You\u2019re Asked for A Ransom?<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">First and foremost, don\u2019t pay any ransom. At best you will simply lose the money you pay, at worst (most hackers won\u2019t bother to \u201cunlock\u201d your files &#8212; that\u2019s just another risk for them), at worst, you will mark yourself as a candidate for further exploitation. \u201cScammers don\u2019t want to risk their own exposure \u2014 they run these scams as broadly as possible and make money from those most frightened and vulnerable, then move on,\u201d Simoni explains.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you are locked out of your files, you may want to consult local computer service professionals. Ransom scams are very common, so they may have seen the hack you\u2019re dealing with before, and know ways to help. If you have regularly backed up your machine, you can change hard drives on your computer and reload your files from your backup source.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But the best way to protect yourself from these scams is to have a good defense.<\/span><\/p>\n<h3><b>Protect Yourself From Hacker and Ransomware<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the best ways to protect your information now is to upgrade your dfndr app (if you haven\u2019t already) to <\/span><b>dfndr PRO.<\/b><span style=\"font-weight: 400;\">&nbsp; <strong><a href=\"\/\/launch\/subscription_plans\" target=\"_blank\" rel=\"noopener noreferrer\">By clicking here, you will learn more, and you can use it to download PRO if you decide it\u2019s right for you. <\/a><\/strong>It <\/span><b><\/b><span style=\"font-weight: 400;\">offers a full suite of security capabilities.<\/span><\/p>\n<p><a href=\"psafe:\/\/launch\/direct_purchase?sku=com.psafe.msuite.pro_lto_12mo\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20373 size-medium\" src=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GetProSecurity-300x56.png\" alt=\"\" width=\"300\" height=\"56\" srcset=\"https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GetProSecurity-300x56.png 300w, https:\/\/www.psafe.com\/en\/blog\/wp-content\/uploads\/2019\/07\/GetProSecurity.png 354w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><br \/>\n<b>1 &#8211; Safe App Installer: <\/b><span style=\"font-weight: 400;\">Protects you from apps known to have had data breaches \u2014 before you install them.<\/span><\/p>\n<p><b>2 &#8211; App Privacy Scan:<\/b><span style=\"font-weight: 400;\"> You can locate on a map where your app data is going and how it might be used by third-parties.<\/span><\/p>\n<p><b>3 &#8211; Unlimited Identity Theft Reports:<\/b><span style=\"font-weight: 400;\"> These provide your \u201couter-perimeter\u201d defense, looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 4 billion compromised credentials.&nbsp;<\/span><\/p>\n<p><b>4 &#8211; Anti-theft protection: <\/b><span style=\"font-weight: 400;\">Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock&nbsp; it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.<\/span><\/p>\n<p><b>5 &#8211; Ad-Free:<\/b><span style=\"font-weight: 400;\"> As an extra bonus, PRO is totally ad-free.<\/span><\/p>\n<h3><b>Stay Vigilant!<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">With dfndr PRO in your toolbox, the rest is a matter of staying as aware as you can and protecting yourself and your family.&nbsp; Consider adopting these rules for use of digital devices in your home:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">1 &#8211; Take extra care with any link or article sent to you on social media by a friend \u2014 look closely at every link you receive before clicking!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">2 &#8211; Don\u2019t click on links sent to you via email from <\/span><b>unknown people.&nbsp;<\/b><\/p>\n<p><b>3 &#8211; Only download or install software from trusted sources.<\/b><span style=\"font-weight: 400;\"> Make sure you double check URL&#8217;s!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">4 &#8211; <\/span><span style=\"font-weight: 400;\">Make sure you do regular backups on your machines, and don\u2019t pay on any ransom note sent your way to liberate your own files \u2014 or to discard compromising material.&nbsp;<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>dfndr lab has noticed that another disturbing trend continues to grow: scams that ask for ransoms from users. <\/p>\n","protected":false},"author":83,"featured_media":20616,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_crdt_document":"","footnotes":""},"categories":[4451],"tags":[12433],"class_list":["post-20614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dfndr-company-news","tag-ransomwares"],"_links":{"self":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/comments?post=20614"}],"version-history":[{"count":8,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20614\/revisions"}],"predecessor-version":[{"id":21105,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/posts\/20614\/revisions\/21105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media\/20616"}],"wp:attachment":[{"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/media?parent=20614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/categories?post=20614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.psafe.com\/en\/blog\/wp-json\/wp\/v2\/tags?post=20614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}