We put together the ULTIMATE 2019 Guide how to protect your business from ransomware. In fact, this complete guide has everything you need to know about ransomware.
Have an immediate question? Please leave a comment below!
OK now, Let’s get READY to RUMBLE!
Unfortunately, you’re either prepared for ransomware or ready to become another victim. It’s just a matter of time.
Which are you?
It’s true. The hit can be costly and extremely time consuming if you’re not prepared. We know it can be embarrassing! All your valuable business data down the drain. Even if you try to pay the ransom, there’s still no guarantee you’ll unlock your computer. Worst of all, you might even have to close your business!
However, there is still good news.
While other businesses will be scrambling seeking help for removing ransomware, (possibly losing all their data) you can sit back with peace of mind knowing you’re ready if ransomware strikes.
Who wouldn’t want that?
Forget costly downtime, and negotiating with cyber criminals. Instead, get prepared for ransomware. Prevention is your golden ticket.
Once you read this 2019 ransomware guide, you should have a solid understanding of the following about ransomware:
- What is ransomware?
- How does ransomware spread?
- How does ransomware get on my devices? – 5 Steps
- What to do if I have ransomware?
- Should I pay the ransom?
- Ransomware survival guide checklist
- 2019 Ransomware facts
- How to prevent ransomware
- The most popular types of ransomware
- Examples of ransomware screenshots
- Top 2019 Ransomware news stories
Ransomware: Malicious software that encrypts your data, blocking access to your computer with a splash-screen of instructions until a sum of money is paid. The preferred method of payment is through an untraceable virtual currency called bitcoin. Victims are alerted that unless a sum of money is paid within a time frame, their files will be destroyed. Here’s a typical example screenshot what ransomware looks like:
The 5 Steps in a Typical Ransomware Attack
Infection – Step 1
You may have opened an email attachment or clicked on a link in an unsolicited email such as a phishing email. Or you may have an infected application. Besides email, ransomware creators can also infect you by using exploit kits. You may have visited an infected website that’s able to exploit your browser and other software that’s running on your device. Finally, RDP – known as remote desktop connection. Port-scanners scour the internet looking for open RDP ports. The ransomware installs itself on the endpoint and any network it can access.
Secure Key Exchange – Step 2
The ransomware on your network contacts the cybercriminals, alerting them a successful exploit is underway. The request for decryption keys are made and generated.
Encryption – Step 3
The ransomware starts using military grade encryption algorithm. There’s AES, RSA, and ECDH encryption. (Some ransomware variants use a hybrid of encryption methods). Encrypting files on the victim’s device is in progress. The victims computer may slow down. Encryption will occur on any files on the local device and the network.
Extortion – Step 4
A splash screen appears to the victim with instructions. Every type of ransomware has a uniquely designed splash screen with a unique deadline of payment. All ransomware threatens to destroy one’s data if the specified payment is not made. Payments are usually demanded in the form of a bitcoin payment because they’re untraceable. Figuring out how to purchase a bitcoin and setting up a wallet can be another pain.
Unlocking – Step 5
Victims can either pay the ransom in exchange for the decryption keys (no guarantee the cyber criminal will pay) or attempt to start their disaster recovery process. This process will remove the ransomware and restore the network from clean backups.
2019 Ransomware Facts
These facts about ransomware ignite many business owners to take immediate action in ransomware prevention:
– A new organization will become a victim of ransomware every 14 seconds in 2019, and every 11 seconds by 2021.
– Ransomware attacks double in 2019, brute-force attempts increase
– Ransomware was the #1 type of malware of 2018 and has no sign of slowing this year in 2019.
– 75% of companies infected with ransomware had up-to-date endpoint protection.
– Only having a proactive disaster recovery plan in place will increase your chances of surviving a ransomware attack.
– 50% of a surveyed IT security professionals claim there are connected devices accessing their networks that they’re unaware of.
– Only 1 in 3 said devices purchased by their organization are cleared by security personnel.
– Data loss and downtime are still the biggest consequences of ransomware.
– It’s important for businesses to know their vulnerabilities and take preventative matters into their own hands.
How Can I Prevent Ransomware in 2019?
4 Tips to Prevent Ransomware
Our most important tip is hiring a trusted managed IT service provider such as hyphenet to do all the prevention for you and to ensure it’s being properly done. (it’s a LOT of work keeping your network safe – we can make it easy for you)
Keep all your browsers, operating systems, and software up-to-date and patched. When hackers learn about a new patch or security update, they will seek out vulnerable businesses for an easy pay day.
Don’t install software that you’re unfamiliar with and do not grant it administrative privileges.
Do install whitelisting software that prevents unauthorized software from and applications from executing.
Update to Windows 10!
Update your operating system to Windows 10. It makes ransomware prevention easier by preventing unauthorized apps from accessing your Windows system files and personal data.
However, you need to make sure your windows 10 has this security setting turned on! (it’s not on by default!) It’s called Controlled Folder Access.
Here’s the steps how to turn on the new anti-ransomware features in the Windows 10 Fall creators Update:
First, we’ll make sure you’re using the Fall Creators Update – version 1709:
Open Settings > System > About. There you’ll see a list of details, look for Version: 1709
Next, open the Windows Defender Security Center. Virus & threat protection > Virus & threat protection settings and turn on the switch under Controlled folder access:
And that’s it! Congrats!
You can take your security even further. Change the default settings using these advanced these steps:
Double check your Protected Folders:
Click Protected folders to identify which folders are currently being protected from malware and suspicious apps.
Double check your whitelisted apps:
Click Allow an app through controlled folder access to view and select your whitelisted apps. Allow your most used and trusted apps that you know are safe.
Please note: You must have Windows Defender real-time protection enabled. Here’s how to turn it on below:
Go to Settings app > click Update & Security > select the Security tab > Select: Choose the antivirus program you want to use. Windows Defender Antivirus will automatically turn on.
Running Windows 10 for Enterprise?
You’ll have to uninstall all your current antivirus programs first.
Note: This feature does not work with third-party antivirus software.
#2 Educate Employees
Your employees are one of your biggest vulnerabilities. They could become targets of social engineering, spear phishing, etc. One wrong click on a spam email could bring an IT disaster such as ransomware.
FREE Cyber Security Training + Quiz for your Employees
Educate your employees about:
– Social engineering
– How to detect suspicious emails
– Suspicious websites
– Password strength
– RDP Remote Desktop Connection
– Enable the “Show file extensions” option in the Window settings
– Stay away from extensions such as “.exe, .vbs, .scr“
– Disconnecting the PC immediately from the network and Wi-Fi if unusual activity occurs
#3 Add Layers of Security
Think your anti-virus software is enough to keep out cyber criminals? Unfortunately, now we need specialized layers of security to protect, detect, and block ransomware attacks before they happen. Consulting with an IT company can also help you find your network’s vulnerabilities and strengthen them. You need to know your unique networks vulnerabilities and protect them.
We offer a FREE onsite Network Security Scan + Report.
Schedule a FREE on-site visit today!
For the most secure protection:
– Antivirus with active monitoring
– Hosted Anti-spam
– Protect your RDP access (Remote Desktop Protocol)
Call us for all the right security protection for your business:
Change the RDP port so port-scanners looking for open ports will not find yours! Instructions on tunecomp.net
What’s RDP? Remote desktop protocol allows remote control of a PC.
If a hacker finds your default RDP port (port 3389 by default) they can start a brute force attack on your login/password prompt.
Finally, Make a stronger password for your RDP
How to protect your RDP access from ransomware attacks – malwarebytes
#4 Create Secure Backups of your Data
If you do get hit with ransomware and your data becomes encrypted, you will have these backups in place to restore your computer.
It’s important to make sure your backed up data:
– Backed up regularly
– Stored offsite (cloud)
– Backup devices such as external USB are disconnected
– Do not store files on the mapped drive
– Make sure you test your backups
The easiest and most effective data backup solution we recommend is Datto. Datto allows your to quickly restore (possibly in minutes) your network from any point of time aka using image based backups! You can empower your business and create Image Based Backups Today
We’re a datto partner and can provide you with the right datto backup for your organization and also a free quote. Get your datto pricing here.
The common ransomware scenario. Is this you?
You’re working on your computer it seems slower than usual; extremely slower.
Your computer’s chugging just to open a folder. Next, your computer is acting unusual. You’re unable to open documents.
Now you’re receiving error messages for “Unknown file type.” Your work productivity has now come to a screeching halt. You’re locked out of your computer!
There’s a bizarre error splash screen that looks something like this:
Curious, you look around the office to see if anyone else is locked out of their computer. Hmmm… should I call the IT guy? Should I wait to see if it goes away?
YES! Call your Managed IT Service Provider because you’re infected with ransomware.
Alert them with the type of ransomware on the screen. You may want to take a photo of your screen to share with IT support. They will instruct you the proper actions to take depending on your network setup.
Understanding your options:
– Pay the ransom / Negotiate a price – No Guarantee
– Restore the files from a backup (make sure your backup is not encrypted – plug a drive into another PC) Fully wipe the drive and do a clean install of the OS and restore the files from a clean backup.
– See if there’s Decryption tools available.
– Remove the ransomware yourself using anti-virus or anti-malware software (see below)
– Reinstall from scratch – “Factory reset” on Windows 10 or use installation disks/ USB sticks.
– Call your Managed IT Service Provider to handle the situation
If you don’t have a Managed IT Service provider.
How to Handle Screen-Locking Ransomware Yourself:
#1 Disconnect your infected computer from the network – both wired and WiFi
Keep your data from leaking over the internet and stop the encryption of your files.
#2 Recover your data from backups
To ensure your computer is clean, you should recover your files from a previous backup on a separate drive. If you have a backup, you don’t have to worry about paying a ransom.
#3 Don’t have a backup?
You can give us a call (619) 325-0990 or try doing these steps yourself:
#4 Reboot your computer in Safe Mode.
(How to get into safe mode: Press the power button and the S key on the keyboard at the same time.)
* (if unable to get into safe mode see step #5.)
#5 Try a System Restore if Safe Mode does NOT work.
Most Windows PCs allow you to roll back to a last known good state.
Here’s how to do a System Restore:
–Windows 7: Restart your PC while constantly tapping the F8 key to get to the Advanced Book Options Menu. Choose > Repair Your Computer > Login with your password > and select System Restore.
–Windows 8, 8.1 or 10: Restart your PC while holding down the Shift key. This should prompt the recovery screen. Select Troubleshoot > System Restore.
#6 Still can’t reach the recovery screens?
Get your installation disk or USB disk for that version of Windows > Reboot from that and select > Repair Your Computer instead of installing the operating system.
#7 Run antivirus software to clean out your PC
NEED free antivirus?
Try downloading free virus scanners (because your anti-virus missed this ransomware virus) If you can’t download it from your computer, download it onto another computer and load it from a USB flash drive:
If using Malwarebytes, Run the quick scan. The scan can take anywhere from 5 to ten minutes.
If the scanner disappears, you have a deep infection that will kill any virus scanners. It’s best to call a professional with ransomware experience at this point or reinstall Windows / start from scratch.
If Malwarebytes detects infected files, click on Remove Selected button to start removing the infections.
When the Malware appears to be gone, restart your computer normally.
If the problem continues, repeat the steps and try the other malware scanners mentioned.
Once finished removing malware, make sure the home page is set to a safe site such as google.com. Many times, malware will set the homepage to a site that will reinfect your computer.
Start > control panel> internet options> home page settings.
We’re seeing an increase of ransomware victims, everyone from small businesses, large enterprises, schools, hospitals, PCs, mobile devices, you name it, it’s everywhere.
The sooner your take these actions, the less chance the infected computer can spread to other computers on the network and the less files the ransomware can encrypt.
#8 Report to the Authorities
The FBI urges all cases of ransomware attacks to be reported.
Here’s the link to report ransomware infections to the FBI
Our managed IT service provider will most likely have a clean backup to restore your files. Hopefully you’re paying them monthly for data backups – please double check your MSP agreement!
Sometimes there’s free decryption tools for known ransomware; free online. Check No More Ransom.org. No More Ransom – Crypto Sheriff – This free resource will help determine if there’s a free decryption key available!
Paying the ransom does not guarantee you will unlock your files.
In addition to encrypting your data, the hackers may have also sold your data on the dark web. Paying will not take down the potential damage.
There’s no incentive for the cyber criminal to send you the keys; once they have already been paid.
Paying only encourages you to pay again.
The servers used to receive payment are sometimes quickly taken offline. Sometimes it’s by law enforcement taking down the servers. Or it’s the cybercriminals, done to cover their tracks or move to their next ransomware campaign.
Why ransomware uses bitcoin?
Hackers prefer bitcoin as payment because it’s fast, reliable, verifiable, and it’s easy to write software that can demand payment and and give notification when payment is received.
Yes. There are significantly less known cases of ransomware occurring on mac OS. However, not one has led to serious outbreaks.
WannaCry spread so rapidly worldwide in 2017! Affecting 116 countries. Easily the worst ransomware attack in history.
Screenshot of bad rabbit ransomware
Cryptolocker infected more than 250,000 systems.
Has extorted over $18 million from victims. The FBI released an advisory.
NotPetya far advanced its origins of Petya that’s why it’s called NotPetya.
Responsible for over $30 million in losses. First appearance in 2015 and is very common.
Popular in 2018 and 2019. Has the ability to disable Windows System Restore. Victims were targeted by large organizations.
Anyone and any business can be a victim of ransomware. As long as you’re connected to a Wi-Fi or network, you’re a target.
Yes. There’s now more than 50 families of this malware in circulation! Cybercriminals know that there are people willing to pay to unlock their data, especially when it’s sensitive data or vital for business continuity.
July 25, 2019: City Power, the electric utility for Johannesburg, South Africa, discloses ransomware attack.
June 26, 2019: Lake City, Florida agrees to pay ransomware.
June 20, 2019: Riviera Beach, Florida, discloses ransomware attack and payment.
May 7, 2019: City of Baltimore hit with ransomware attack.
April 2019: Cleveland Hopkins International Airport suffered a ransomware attack.
April 2019: Augusta, Maine, suffered a highly targeted malware attack that froze the city’s entire network and forced the city center to close.
April 2019: Hackers stole roughly $498,000 from the city of Tallahassee.
March 2019: Albany, New York, suffered a ransomware attack.
March 2019: Jackson County, Georgia officials paid cybercriminals $400,000 after a cyberattack shut down the county’s computer systems.
There are many free ransomware decryption tools. Check out the Crypto Sheriff at nomoreransom.org
Typical Ransomware Messages:
- “Your personal files are encrypting…”
- “Your computer has been locked”
- “FBI Online Agent has blocked your computer for a security reason”
- “You became victim of the ______ RANSOMWARE!”
- “WARNING! Your personal files are encrypted”
- “YOUR FILE HAS BEEN LOCKED”
- “All your files have been encrypted”
It might not be ransomware after all
You can remove many ransomware viruses without losing your files. Many times, you can run your virus scanner or make offline scans and advanced recovery of your files.
Sometimes ransomware is actually Scareware, which is bogus ransomware. You can still move your mouse and use your PC. The only catch, your PC is receiving lots of pop ups.
Most Common Types of Ransomware
New strains of ransomware are reported weekly. Here’s the current top 5 most popular types of ransomware. You might also want to browse the largest collection of ransomware screenshots to see more variations.
Elements of Ransomware
- A splash screen alerting you that your files are encrypted / or sometimes it’s a plain notepad of instructions
- Inform you that you need a decryption key
- Instructions how to obtain a key
- The cost of a private key to unlock your files (The cost is most commonly shown in bitcoins)
- Time limit
- The bitcoin address to send your payment
- Sometimes a help section is included
- Sometimes they want you to download the TOR browser (dark web)
- A place to submit your key with unlock button
- Sometimes they inform you the price will go up
Is your business an easy target for ransomware?
7 Unlucky Signs your Business is an Easy Target for Ransomware
“I’m just a small business, nobody would ever want to target me.”
Take a quick look at these red flag signs:
#1 Outdated Equipment
Old computers are a security risk. The newer the technology, the more security.
The more up to date your hardware, the more difficult it is for cyber criminals to get your data.
#2 Your Browser and Operating Systems are Unpatched
25% of the world’s desktop computers are still running Windows XP.
Because this operating system is no longer receiving patches or or security updates – the risk of getting hacked increase every day,
#3 You’re using Legacy Software
Legacy software implies that the system is old and out of date.
The older the version of software, the more patches and updates it needs and hackers know all the vulnerabilities.
The cost of running legacy is actually greater than upgrading.
#4 You don’t have a cyber security strategy in place
Many small businesses are actually an easier target to cyber criminal because they don’t have a cyber security strategy in place. They may not have an IT person on staff or outsourced IT department. This not only puts their company at risk, but also their customers information. Without cyber security in place, your company is a sitting duck.
Sadly, if your business gets hit with ransomware and you lose all your data – only 6% of companies survive longer than two years after losing data.
#5 You don’t have a working backup plan
Ransomware puts all your data at risk, can you afford to lose it? You need a data backup for a few reasons, in case a natural disaster strikes, human error, ransomware, etc.
Without a working data backup, your company is vulnerable to having to “pay the ransom.” Worst, you might pay the ransom and you don’t get the key to decrypt your files.
Related News Article: Ransomware hackers get their money, then ask for more – http://www.engadget.com
#6 Your employees open and download attachments
Believe it or not, the biggest risk your business faces against ransomware is your employees. They’re prone to human error, accidentally opening emails that have ransomware attached.
#7 Your employess’ mobile devices are connected to the network
Ransomware is the Biggest Cyber Threat to Small and Mid-Sized Businesses
Datto has just confirmed in an alarming 2018 report that ransomware is the #1 cyber threat to small to medium-sized businesses.
Is your small to mid-sized organization ready for a ransomware attack?
Ransomware continues to be the most popular cyber-attack small and mid-sized businesses are experiencing – Yes, outnumbering computer viruses and spyware!
If you think your business is too small to be a target for ransomware, guess what? This mindset makes you an easy pay day for the most armature cyber-criminal. (Cyber criminals are selling ransomware as a service) Many CEOs think it’s not worth the money to protect themselves. And when they DO get hit with ransomware, they’re shocked by the price to get their business back up and running.
This mindset means that your business most likely does not have the following necessities :
- Business continuity and disaster recovery (BCDR)
- Ongoing training for employees
- Endpoint protection
- Intelligent Data backups
Additional Shocking Facts about Ransomware
- Downtime is more costly. The average ransomware attack on the business costs 10 times more than the actual ransom. The survey finds the costs on average, $46,800, and the ransomware request at $4,300 per attack.
- Attacks are expected to increase. More than 55% of MSPs (managed service providers) disclosed their customers experienced a ransomware attack within the first 6 months of 2018. 35% said their customers were attacked multiple times in the same day. 92% of MSPs predict ransomware attacks will continue at or increase in rates.
- Antivirus software is not enough, they’re actually ineffective. 85% of MSPs reported that victims of ransomware already had antivirus installed. 65% said victims had email spam filters installed. 29% reported that victims had pop-up blockers that failed to block the ransomware attacks.
- Apple operating systems can be vulnerable to ransomware. There was a 5X increase in the number of reported ransomware attacks on macOS and iOS platforms.
- Less than 1 in 4 ransomware attacks are reported to authorities The problem may be actually bigger than we even know.
- New Ransomware strains include Public Shaming. Some versions of ransomware claim to have taken photos of you from your web camera. They also claim to blackmail you deeming the photos were taken of you viewing pornography, and threaten to publish them. Perhaps send them to everyone on your contact list.
- The FBI and Law Enforcement cannot help you. The FBI will usually recommend that you pay the cyber criminals to gain back access to your computer.
- The average ransomware payment is around $300.00. Individuals are the most common victim of ransomware. And the forms of payment preferred are Bitcoin or green dot MoneyPak. Both untraceable.
- The ransomware Cryptowall 3.0 has profited over $325 million. Cryptowall emerged in January 2015 and experts estimate the group cause $325 million in damages across the world, primarily from the US.
- Adobe Flash is to blame for recent Ransomware spread. 8 of the top 10 vulnerabilities were discovered to be Flash-related.
- Malvertising Fuels Ransomware. Phishing is a huge cause of ransomware, and now malvertising is becoming popular too. Many news sites had their advertisements hijacked with ransomware.
- Cyber Criminals can Buy Ransomware-as-a-service (SaaS) model. Cyber criminals are shopping the black market for ransomware-as-a-service, giving the developers a share of their earnings.
- Ransomware is also hitting Linux and OSX, mobile devices such as smartphones.
- Anti-Virus software isn’t enough. With new variants of malware evolving everyday, traditional signature-based anti-virus products can’t keep up.
- Ransomware can disguise themselves as porn apps.
- The United States has the most ransomware detection’s.
We recommend you take an “eye opening” look at Datto’s 2018 Global State of the Channel Ransomware Report
Ransomware Survival Checklist Before During After
The BAD news, ransomware isn’t going away, in fact, it’s here to stay.
The GOOD news, the sooner you realize this statement “my business is too small to get hit with ransomware” is not feasible, the better! Yay!
Why is ransomware flourishing? Simply because most companies are NOT prepared for a ransomware threat. Ponemon Institute’s 2016 State of Endpoint Report reveals 56% of companies are not ready to fight off ransomware attacks.Tantalizing news for cyber criminals right?
I recommend you get your work-boots on and dive into becoming a force to be reckoned with! Ready? Let’s go!
If you use this ransomware survival guide checklist, your small business will defiantly be “beefed up” to ransomware.
BEFORE: Preventing Ransomware
- Invest in a robust data backup and restore solution + testing backups – The most important golden step to preventing ransomware affecting your business
- Update and patch – Many businesses struggle keeping up-to-date, making them vulnerable
- Train and educate your employees about phishing emails, social engineering, macros, and ransomware
- Invest in email filtering – Most ransomware is transmitted by email
DURING: Getting Back to Business
- Call the FBI – Ransomware is a crime–theft and extortion are in play
- Disconnect from your network – take the infected machine to the IT department
- Determine the extent of the problem – Who in the network is compromised? What type of ransomware?
- Pay or Play? – We recommend you don’t pay a ransom and restore from backups
- Don’t count on free ransomware decryption tools – Free tools quickly become outdated
- Restore from backup – You should be backing up everyday
AFTER: Review and Reinforce
- Clean up – Wipe your devices and restore from a clean backup
- Examine – How can we improve network configurations?
- Assess your employee awareness – Address employee vulnerability
- Invest in modern defenses – Hackers are usually one step ahead of you
- Invest in managed IT services – Don’t rely on one employee for your cyber security needs
Would you like peace of mind that your business is proactively defending itself from ransomware? Give us a call, (619) 325-0990
As a trusted managed IT service provider, we’re the experts in to call in San Diego when it comes to preventing ransomware and ensuring your data is being protected and properly backed up.
Want to get your business prepared for ransomware?
Become equipped and ready to respond when ransomware hits your business.
Call Hyphenet, we’re ready to help you: (619) 325-0990
Want to safeguard your business from Ransomware?
Give us a call: (619) 325-0990
We’re an IT company in San Diego, CA. Providing Managed IT services to businesses across San Diego county on-site and remotely.
There has been an alarming number of businesses affected by ransomware, we’re here to help prevent your business from becoming a victim to ransomware. Allow us to place the correct security measures in place today. Call for a free Quote now: (619) 325-0990
Ransomware in the News
Ransomware is more frequently seen in news stories than ever!
Atlanta recovery cost $17 million after being hit with SamSam ransomware
ScMagazine.com. The original ransom demand was $51,000 in bitcoin but the recovery costs were over $17 million.
Ransomware attacks on businesses are skyrocketing – Up 363% PCMag.com
That’s a year over year increase on ransomware attacks businesses. The good news, attacks on consumers are down.
2 Iranians behind SamSam ransomware attacks, US claims – PCmag.com
The 2 Iranian men were charged with computer hacking crimes that allegedly caused more than $300 million in losses and more than 200 known victims. Victims include: the city of Atlanta, the city of Newark, Port of San Diego, 6 health-care related groups, including LabCorp.
Ransomware attacks: Weak passwords are now your biggest risk – zdnet.com
Researchers say brute force and remote desktop attacks have become the mot common method for cyber criminals to spread ransomware. These cyber criminals are relying on weak and default passwords to easily gain access. They usually gain help from bots that will input as many passwords as possible.
2019 ransomware statistics Phoenixnap.com
Ransomware Attacks Double in 2019, Brute-Force Attempts Increase – Healthitsecurity.com
2018 Report – The Internet of Evil Things – Pwnieexpress.com
Why your old computer poses security risks – Bankrate.com
Problems posed by legacy computing – Wikipedia.org
only 6 percent of companies survive longer than two years after losing data – http://www.homelandsecuritynewswire.com/
Why Every Small Business Needs a Backup and Disaster Recovery Plan – https://www.entrepreneur.com
5 Ways Employees Accidentally Threaten Data Security – http://legal-workspace.com/
Ransomware encryption techniques – Medium.com
A Brief Summary of Encryption Method Used in Widespread Ransomware – infosecinstitute.com
What to do if you’re infected with ransomware – Tomsguide.com
Ransomware Screenshot Collection – Hyphenet.com