Ransomware is a form of malware (a computer virus) that encrypts files, denies the user the ability to access their device, or both. There are many forms of ransomware, but nearly all lead to a demand for payment of a ransom for access to be regained. The ransomware may also be accompanied by the theft of data and a threat to post this information online.
Attacks typically come in the form of phishing emails, downloading free software, and remote access scams (where a threat actor, posing as a trusted source, is provided access to a device and installs ransomware whilst in control). Once the ransomware has been executed, such as by clicking on links or attachments, the criminals have largely automated their whole process. Pop-ups or other on-screen messaging will alert the user to “a virus” or “encryption” or the computer being "locked”. A contact point will be provided, typically with a short timeframe to respond to the ransom demand.
This fact sheet will address the following:
This fact sheet may contain references to several third-party products and services. Please note that IDCARE does not have any affiliation with these services, and only provides named services in the interest of hardening your cyber resilience.
Back up and Encrypt your Data: Ensure you back up and encrypt all of your data, both offline (to a separate hard drive) and in the cloud (through an online hosting service), as this minimises the impact of a ransomware attack by preserving access to your files.
Run Anti-Virus Software Frequently: Regularly run your anti-virus software and keep it updated to protect against the millions of new viruses created each year.
Keep Systems Updated: Always keep your operating system, devices, and applications updated to patch vulnerabilities that cybercriminals may exploit.
Enable Multifactor Authentication: Use multifactor authentication wherever possible to add an extra layer of security to your accounts, making it harder for unauthorised users to gain access.
Use Strong Passwords: Create strong, unique passwords for each account and store them securely in a password manager to prevent easy access by attackers.
Block Ads and Pop-Ups: To reduce the risk of inadvertently clicking on malicious ads that can lead to a ransomware infection. Note that some ad blocker extensions may be suspicious in origin, so its best to do this directly via your browser’s settings page.
Be Cautious with Freeware: Think twice before downloading freeware without checking its security, as these programs can often carry hidden malware.
Spot Phishing Emails: Familiarise yourself with how to identify phishing emails, which can trick you into providing sensitive information or downloading malware.
Don’t Provide Remote Access: Never grant remote access to your device if contacted unexpectedly by someone claiming to be from tech support or any service provider.
Educate Employees: Provide training to your employees on how to prevent and respond to ransomware and phishing threats, fostering a culture of cybersecurity awareness.
Discuss Network Security: If your business handles sensitive data, consult with your IT provider about implementing additional network security measures, such as network segmentation, to enhance protection against attacks.
There are two ways to detect ransomware:
1. Your anti-virus software informs you that it has detected and prevented the malware from executing, or
2. On-screen messaging appears from the criminal demanding payment or some other form of action.
Be aware: If a ransomware message is received via email, be sure that is a genuine email and not simply a phishing attempt.
Files Become Encrypted: One of the most telling signs of a ransomware infection is the sudden inability to access files. You may notice that files have changed extensions (e.g., from.docx to .locked) or that they cannot be opened without a decryption key.
Unusual File Behaviour: If files are being modified, renamed, or moved without your input, this may indicate that ransomware is actively encrypting your data. Additionally, the presence of new files with unfamiliar names or extensions could be a sign of malicious activity.
New User Accounts or Changes in Permissions: Ransomware can create new user accounts or modify existing ones to facilitate further access to your system. If you notice unfamiliar accounts or unexpected changes in user permissions, investigate promptly.
Access Denied Errors: Receiving "access denied" messages for files that were previously accessible can indicate that ransomware has altered permissions as part of its encryption process.
Backup Failures: If your regular backup processes are failing without clear explanations, it could indicate that ransomware is blocking access to files to prevent them from being backed up.
If you suspect a ransomware infection, it’s crucial to disconnect from the network immediately and consult with cybersecurity professionals for remediation.
Disconnect your device immediately, including removing anything plugged into it (cables,USBs, dongles), disabling any wireless connections (Wi-Fi, Bluetooth, hotspot, or mobile data), and disconnecting from any other devices on your network (such as laptops, printers or modems).
Take photos (on a non-infected device) of any communications from the criminals, including pop-ups, payment demands, cryptocurrency wallet addresses and websites.
If your device is not responding, hold down the power button to switch it off.
Make sure the malware is removed from your device before reconnecting to the internet, joining a network, plugging anything back in, or installing backups of your data.
The ACSC has several tips to recover from a ransomware infection - which also includes how to remove ransomware from infected devices by reformatting the hard disk or initiating a factory reset of the affected device.
Note that if you do not have a backup of your data, a factory reset or reformat will completely wipe all data from the device.
You may wish to try to decrypt the files on your device. There are hundreds of ransomware types, and in many cases only the criminals have the tools to decrypt.
You can try:
1. Engaging an IT professional - see the ACSC tips.
2. Using free decryption tools online, including Crypto Sheriff, ID Ransomware, Emsisoft and Heimdal Security.
3. Accessing decryption services - these are by no means a guaranteed result and most cost money.
If you are considering paying the ransom, keep in mind:
Remember that removing the ransomware from your device may not be the end of the attack on your business. Consider all the information that the cybercriminals had access to on your device and assume that all accounts have been compromised. This could include your emails, bank account details (including logins and customer reference numbers), tax file numbers, driver licence details, and superannuation details.
Information stored on your device most likely also includes information about your employees and customers. Contact your IDCARE small business adviser to discuss how to protect your employees and customers, and whether the ransomware infection is also considered a notifiable data breach.
Identity Care Australia & New Zealand Ltd (IDCARE) provides identity and cyber security incident response services (the Services) in accordance with the following disclaimer of service:
Mon - Fri: 8am - 5pm AEST
QLD: 07 3555 5900
ACT & NSW: 02 8999 3356
VIC: 03 7018 2366
NT, SA & WA : 08 7078 7741
Mon - Fri: 10am - 7pm NZST
AKL: 09 884 4440
IDCARE as a registered charity does not ask individuals to donate or pay for our front line services. We are not a charity that can receive tax deductible donations.
We rely on organisations that care enough about you to care about us to keep our charitable service going. Proudly these organisations are displayed above and on our Subscriber Organisations page.
If you are asked for payment from someone claiming to be from IDCARE, please report this to us using our Report Phishing email.
IDCARE has access to the Department of Home Affairs Free Interpreting Service, delivered by the Translating and Interpreting Service (TIS National). Access to the Free Interpreting Service is provided to assist you to communicate with non-English speaking people who hold a Medicare card. Please note that the service does not extend to New Zealand citizens or residents who do not hold an Australian Medicare card, or to tourists, overseas students or people on temporary work visas.
New Zealand Relay provides services to help Deaf, hearing impaired, speech impaired, Deafblind and standard phone users communicate with their peers.
A TTY user connects to New Zealand Relay via a toll-free number and types their conversation to a Relay Assistant (RA) who then reads out the typed message to a standard phone user (hearing person).
The RA relays the hearing person's spoken words by typing them back to the Textphone (TTY) User.
The National Relay Service (NRS) is an Australian government initiative that allows people who are deaf, hard of hearing and/or have a speech impairment to make and receive phone calls.
The NRS is available 24 hours a day, every day and relays more than a million calls each year throughout Australia.
ABN 84 164 038 966
IDCARE acknowledges and Respects the traditional custodians of the land on which we operate across Australia and New Zealand.
This website may contain names, images and voices of deceased Aboriginal, Torres Strait Islander and Māori peoples.