Categories: Security

If a Ransomware Attack Happens to You, Should You Pay?

Just imagine: you try to open the screen on your phone, hoping to message a friend and suddenly a note pops up on your screen. It says your files have been encrypted, and you can’t access them unless you pay hundreds of dollars. To prevent this scenario, you should back up your files and avoid suspicious links and downloads. Further, you should regularly scan your device for malware. Click here to use security scan to quickly remove hidden security threats to ensure you are never a victim of ransomware:


Ransomware is a lot like scareware — it gains access to your computer when you click on infected popup ads or websites. Unlike scareware, though, ransomware restricts users’ access to their own data, making people panic and think they have no choice but to pay up. If you’re a victim of ransomware, here are some steps to take.

Read More: Ransomware Attacks Are Increasing on Android

Should You Pay the Ransom?
On the one hand, hackers usually return stolen data if the ransom is paid since they want to maintain an incentive for paying. On the other hand, cooperating shows hackers that you’re an easy target, often leading to future attacks. The government tends to advise against paying ransoms because it benefits the ransomware “business model” by encouraging hackers to keep launching ransomware attacks.

Determine the Type
There are two main types of ransomware: encrypting and screen-locking. If you can’t open files such as documents, photos, and emails, but you can still browse the Internet and use apps, this is encrypting ransomware. If your computer or phone is stuck on the ransom note and you can’t use it at all, it’s screen-locking ransomware. On the other hand, if you can use your device normally and access most of your files, the ransomware is probably fake, and you can ignore the attack.

Encrypting Ransomware
This is the most common and, unfortunately, the most malicious kind of ransomware. First of all, if your computer is infected disconnect if from any other devices, and go offline to prevent the virus from spreading to other devices. Next, use antivirus software to remove the ransomware. This will not let you access the encrypted files, but it will stop the ransomware from encrypting more files. To recover deleted files and access encrypted ones, use online tools designed for that purpose. There are many available, both free and paid, so do some research, and use more than one if necessary. If you don’t want to handle it alone, take it to a computer specialist to help decrypt your files.

Screen-Locking Ransomware
This type is easier to handle than encrypting ransomware. Still, you’ll want to disconnect from other devices and go offline. Then, press the power button and the “S” key at the same time — this will put your computer in Safe Mode. Next, run antivirus software to eliminate the ransomware.

Finally, if you’re a victim of ransomware, remember that this is a crime and should be reported to the Internet Crime Complaint Center (IC3). The IC3 reviews the complaint and forwards relevant information to local or federal authorities. Stand up to hackers by reporting and don’t just wipe the device clean.

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago