![Lead Image © Andrea Danti, 123RF.com Lead Image © Andrea Danti, 123RF.com](/var/ezflow_site/storage/images/archive/2016/36/discover-ransomware-with-powershell/po-23008-123rf-andrea_danti_123rf-periskop_resized.png/132130-1-eng-US/PO-23008-123RF-Andrea_Danti_123RF-Periskop_resized.png_medium.png)
Lead Image © Andrea Danti, 123RF.com
Discover ransomware with PowerShell
Danger Ahead
Backups are not a panacea for all ransomware infections. If a backup overwrites your original files with ransomware encrypted data, your files are gone. Admittedly, this only applies to trivial backup strategies, which you might find in small business environments or in freelancer operations. In mid-sized companies and enterprise environments, this may be not so tragic at first glance, because your archives have backups for the past few weeks.
However, even this is not guaranteed. If the data are outdated, the backups are not much use after a restore. In simple scenarios, the data are only saved to a USB hard drive or online storage, and there is typically only one backup set. An even greater danger is overwriting usable backup data with ransomeware encrypted data. This is especially true if the ransomware does not change the file extensions, which happens in some cases. Of course, there is no alternative to the backup and restore protection concept.
Basic Protection Measures
A reliable process for addressing ransomware is not yet available, even if the security industry has reported initial success here and there. Ideally, you should implement general security recommendations and thus make life difficult for the ransomware. These recommendations include:
- Patching in good time.
- Working without administrative permissions.
- Hardening the web browser and preventing (JavaScript) scripts, where feasible.
- Disabling macro functionality, where reasonably possible.
- Analyzing email attachments critically.
- Verifying system-wide access permissions.
- Operating multilevel backups.
Ransomware typically relies on a brutal approach. For example, it reads and encrypts all of a computer's game files or all of your private photos in one fell swoop and writes them back to the disk. Upon completion, a message appears on your
...Buy this article as PDF
(incl. VAT)