
Remove disks from the infected PC and connect them to a computer without any personal data and equipped with an updated antivirus and all the tools to retrieve files that haven’t been encrypted yet.Verify that no other PC on the network is infected.Move infected files on an external disk and change the share content with the last backup before reconnecting. If so, immediately disconnect them from the network and verify that the infection is limited to just those folders. Check every network shares (servers, Nas) and verify they aren’t infected.Immediately power off the computer, or computers, that are infected and disconnect any network cable.Some behaviour rules are quite elementary, still we’d like to reiterate them as we often speak with sysadmins or so-called experts that give useless advice. At the same time, criminals are more and more clever and astute to delete private keys after attacking the victim, making unuseful any retrieval effort when servers are confiscated by american and european polices. Those “bugs” found in some of the initial releases of, for instance, Cryptolocker, which could offer a way to decrypt data, are now fixed so this remediation method cannot be used any longer.

The other bad news is the decreasing efficiency of some data retrieval techniques that have been successfully applied up to now. Ransomware is multiplatform: now it spreads not just on Windows but also on Linux and Mac.Īnother dangerous trend that can worsen the situation is the availability of kits for the creation of ransomware to be autonomously distributed, such as Ransom32, thus ending up in the growth of the number of people that can exploit this criminal technique.It can keep the system running and grant access to files as long as the encryption job is not complete, so that the user can’t recognize the infection and immediately power-off the computer.

It allows only a few days to pay the ransom: data is remotely deleted after a week or just 10 days.

