Categories: dfndr News

Ransom Scams On The Rise

We’ve been writing quite a bit about the rise we’ve seen in Coronavirus related scams and malware, but in the midst of this uptick, another disturbing trend has continued to grow: scams that ask for ransoms from users. 

“Unfortunately, one of the traits of the hacking community is relentlessness,” explains Emilio Simoni, Research Director at dfndr lab, “there are always multiple scams being run and the sheer volume and variety of them works to the hackers’ advantage.” Simoni continues: “With the worldwide and individual attention given to coronavirus, we’re of course seeing many scams of this type, but this kind of focused attention creates an opening for other types of scams to flourish. Ransomware scams are some of the worst, because of the potential financial damage for frightened users — so of course this threat requires that users be alert and take appropriate steps.”

How Do Ransomwares Operate?

Typical ransomware scams operate on social media or via email.  On social media, users will deploy malware links on a post from a hacked or “spoofed” (fake) account, and unwary users will unthinkingly follow links provided by people they believe they know. Simoni explains, “One of the hallmarks of these scams is the use of a fake-account as a kind of mask — creating trust and trapping those who simply click without thinking.” Some of the malware used in these scams will freeze your hard drive or lock you out of needed files or folders: this is why it’s crucial to have a regular backup routine for your machine.

Another common ransomware scam involves the threat of revealing potentially embarrassing information, often using messages that refer to popular porn sites and claim the possession of compromising material and information.  An example of a ransom note of this type appears below:

What Should You Do If You’re Asked for A Ransom?

First and foremost, don’t pay any ransom. At best you will simply lose the money you pay, at worst (most hackers won’t bother to “unlock” your files — that’s just another risk for them), at worst, you will mark yourself as a candidate for further exploitation. “Scammers don’t want to risk their own exposure — they run these scams as broadly as possible and make money from those most frightened and vulnerable, then move on,” Simoni explains.

If you are locked out of your files, you may want to consult local computer service professionals. Ransom scams are very common, so they may have seen the hack you’re dealing with before, and know ways to help. If you have regularly backed up your machine, you can change hard drives on your computer and reload your files from your backup source. 

But the best way to protect yourself from these scams is to have a good defense.

Protect Yourself From Hacker and Ransomware

One of the best ways to protect your information now is to upgrade your dfndr app (if you haven’t already) to dfndr PRO.  By clicking here, you will learn more, and you can use it to download PRO if you decide it’s right for you. It offers a full suite of security capabilities.


1 – Safe App Installer: Protects you from apps known to have had data breaches — before you install them.

2 – App Privacy Scan: You can locate on a map where your app data is going and how it might be used by third-parties.

3 – Unlimited Identity Theft Reports: These provide your “outer-perimeter” defense, looking out for privacy vulnerabilities beyond your own device. These reports reveal if any of your information has been leaked, with a one-click check of a database with over 4 billion compromised credentials. 

4 – Anti-theft protection: Protects against physical loss that leads to data loss: in case of theft or loss of your device, you can lock  it down remotely, find the phone on a map; or, activate a loud alarm to find it nearby. You can also get a picture of the thief, and wipe the phone of your personal data.

5 – Ad-Free: As an extra bonus, PRO is totally ad-free.

Stay Vigilant!

With dfndr PRO in your toolbox, the rest is a matter of staying as aware as you can and protecting yourself and your family.  Consider adopting these rules for use of digital devices in your home:

1 – Take extra care with any link or article sent to you on social media by a friend — look closely at every link you receive before clicking!

2 – Don’t click on links sent to you via email from unknown people. 

3 – Only download or install software from trusted sources. Make sure you double check URL’s!

4 – Make sure you do regular backups on your machines, and don’t pay on any ransom note sent your way to liberate your own files — or to discard compromising material. 

PSafe Newsroom

The dfndr blog is an informative channel that presents exclusive content on security and privacy in the mobile and business world, with tips to keep users protected. Populated by a select group of expert reporters, the channel has a partnership with dfndr lab's security team. Together they bring you, first-notice news about attacks, scams, internet vulnerabilities, malware and everything affecting cybersecurity.

Share
Published by
PSafe Newsroom
Tags: ransomwares

Recent Posts

Vulnerabilities in Cyber Security: what they are and how to fix them?

Learn all about one of the hackers' favorite breach method and keep your company safe…

1 year ago

3 ways to recover deleted photos on Android

Have you ever wondered how to recover deleted photos on Android? After all, the lack…

1 year ago

What is worm?

Digital worms are among the most serious threats in the wild kingdom of the Internet.

2 years ago

Spoofing: What’s it all about?

Spoofing is a fairly sophisticated virtual scam that can fool even the most cautious and…

2 years ago

Careful With That QR Code! Five Steps For QR Code Safety

Five Steps to Reduce QR Code Risk! Step one? Read this article…

2 years ago

Pharming: Phishing’s Nasty Big Brother

Pharming is creating a new, dangerous brand of impostor syndrome. Check how to avoid pharming…

2 years ago