Dealing with a Ransomware Attack: A full guide

Sdílet
Vložit
  • čas přidán 4. 06. 2024
  • Help! Infected by Ransowmare? This video is a full guide on how to deal with a ransomware attack, how to decrypt your encrypted files, lockdown your network contain damage, recover data and so on.
    ▼ Links, Resources and Contact Information ▼
    ✉ Contact us for business: www.thepcsecuritychannel.com/...
    🔥 Love the channel? Become a Patreon:
    / tpsc
    🔥 Buy the best antivirus/security products with exclusive discounts and support this channel:
    www.thepcsecuritychannel.com/buy
    🔥 Join us on Discord and participate in our active community:
    www.thepcsecuritychannel.com/...
    ▶️ See how your product performs in a Test vs Malware:
    www.thepcsecuritychannel.com/...
    ▶️ Want to learn cybersecurity? Get started here:
    www.thepcsecuritychannel.com/...
  • Věda a technologie

Komentáře • 972

  • @pcsecuritychannel
    @pcsecuritychannel  Před 4 lety +515

    Response to certain concerns in the comments:
    I’m aware that “pulling the plug” can destroy evidence for forensic investigators, but the value of potentially preventing a large amount of data from being encrypted in the first place can be much greater for the user than the slim chance of finding file traces or the encryption key in memory through a high cost forensic investigation. Of course it only makes sense if done early, and as with everything not everyone agrees. This video is meant to be a general guide for most people but of course it cannot tell you how to perfectly deal with every possible scenario.

    • @Ronaldo-nj9pi
      @Ronaldo-nj9pi Před 4 lety +15

      I would go with unplugging the network card or switch!

    • @illuc_
      @illuc_ Před 4 lety +2

      @Deadpoppin Only if you have n word pass

    • @georgek4416
      @georgek4416 Před 4 lety +1

      Ok

    • @georgek4416
      @georgek4416 Před 4 lety

      @Deadpoppin Your n word pass please.

    • @alphaomega5017
      @alphaomega5017 Před 4 lety +1

      2019 has started with ransomware attacks and till this day we hearing ransomware attacks happening.

  • @marxt1237
    @marxt1237 Před 4 lety +2523

    I hope I wont need to use this video in my lifetime

    • @krzychox
      @krzychox Před 4 lety +22

      Same

    • @energygameplay6513
      @energygameplay6513 Před 4 lety +18

      @@malwaretestingfan im not a expert but i think it depends on the kind of ransomware and what methods and algorytms it uses to encrypt

    • @redrock9319
      @redrock9319 Před 4 lety +2

      Backup

    • @felixiii4186
      @felixiii4186 Před 4 lety +3

      @@malwaretestingfan how does renaming the zip file to exe help?

    • @malwaretestingfan
      @malwaretestingfan Před 4 lety +18

      @@felixiii4186 Simple. Ransomwares always avoid EXE files, to not corrupt themeselves.

  • @mrmacedon
    @mrmacedon Před 4 lety +2050

    There is a special place in hell for ransomware developers

    • @PyPylia
      @PyPylia Před 3 lety +17

      @Geek Gamer Not always.

    • @ammonquitalig9077
      @ammonquitalig9077 Před 3 lety +4

      @Geek Gamer make a new market..smh

    •  Před 3 lety +67

      Not the developpers, but the ones who use them

    • @jamesmhango2619
      @jamesmhango2619 Před 3 lety +19

      For such people hell does not even exist. Rather address the gullibility on the other side of the keyboard. Backup backup and backup your data.

    • @HK-sw3vi
      @HK-sw3vi Před 3 lety +14

      who knows, people who made this are top Avast or Cisco employees?

  • @fredriddles1763
    @fredriddles1763 Před 3 lety +100

    Tips for avoiding ransomware in the first place:
    1. don't click links in emails
    2. don't download programs or microsoft docs off the internet
    3. Don't visit sketchy websites
    4. Don't touch popups or ads
    5. don't plug random USB drives you find into your computer.

  • @gyrozeppeli1504
    @gyrozeppeli1504 Před 4 lety +1076

    200 IQ move:
    Encrypt your files before a ransomware can.

    • @dalek9554
      @dalek9554 Před 4 lety +19

      its prettygood genius

    • @ptyxx
      @ptyxx Před 4 lety +27

      Big brain

    • @lewp4452
      @lewp4452 Před 4 lety +24

      its not that easy , windows services will not fuction as they target .dll files too

    • @LiEnby
      @LiEnby Před 3 lety +153

      it'lll just encrypt it again

    • @lolmidas8215
      @lolmidas8215 Před 3 lety +1

      My friend does it lol

  • @prettyepicname
    @prettyepicname Před 4 lety +783

    *just pull out an uno reverse card so now they pay you*

  • @bazcurtis178
    @bazcurtis178 Před 4 lety +273

    Make sure your backups are off line. Attackers tend to delete them. They have been on your network long before the encryption. Check who has admin rights on your network and reset all your password.

    • @Ronaldo-nj9pi
      @Ronaldo-nj9pi Před 4 lety +28

      Air gap'd backups are a must for every network! Do not leave the only copy of your data connected to the computer/network!!!!!

    • @karlbergen6826
      @karlbergen6826 Před 4 lety +3

      Good comment and reply.

    •  Před 3 lety

      Or on connected cloud storage with an account with read privileges only. And use a different account on a VM every time you need to create/upload them

    • @yannick6303
      @yannick6303 Před 2 lety +1

      What do people mean by network? Your wifi network?

    • @bazcurtis178
      @bazcurtis178 Před 2 lety +5

      @@yannick6303 they will be inside your organisation moving around the corporate network. They will know more about your internal network than you do

  • @ilmansalt
    @ilmansalt Před 3 lety +338

    getting rid of the "malware" is easy, the hard part is getting your data back.
    If you dont care about your data, just reinstall windows or format your pc

    • @ChrissQuartz
      @ChrissQuartz Před 2 lety +12

      i've had to do that but i havent had ransomware yet, just me being stupid and accidently deleting the boot file

    • @Boon_LightBurn
      @Boon_LightBurn Před 2 lety +14

      @@ChrissQuartz how do you accidentally delete the boot file
      Did you corrupt your bios or something

    • @adityavarshney6690
      @adityavarshney6690 Před 2 lety +2

      Also don't forget to secure your network, passwords, services, and the like so it doesn't happen again

    • @JohnSmith-xf1zu
      @JohnSmith-xf1zu Před 2 lety +9

      @@Boon_LightBurn For me, I did something else stupid, and attempted to restore cloned backups. I messed up, and the UEFI couldn't find the windows boot location. Then I facepalmed when I realized I could have just used Windows Restore for the issue. Was a bad day, but at least no data loss due to having backups.

    • @Boon_LightBurn
      @Boon_LightBurn Před 2 lety +1

      @@JohnSmith-xf1zu that sounds like a bad day, I am sorry sir

  • @timepasswallah
    @timepasswallah Před 4 lety +86

    Thank you thank you thank you so much, my PC got attached by ransomware. My all the files got encrypted. Luckily I saw this video and I checked with 1 file, it got decrypted. So happy. Thank you so much. I got my all old memories thank you...
    Guys really it works.

  • @ayarriba9093
    @ayarriba9093 Před 2 lety +22

    I had my entire OneDrive documents folder taken hostage by ransomware when I was 16. It was the week of my GCSE coursework hand ins for my Design class and I had to redo months of work in a few days. It was fucking traumatic and I hope to god as an adult I never get into this situation again.

    • @TheGamingChad.
      @TheGamingChad. Před 2 lety +3

      it thought me a lesson, i bought 5 external hard drives for extra layers of protection, i transfer all my stuff to my external drive weekly for now on, 2 days ago i got all my thousands of photos and videos encrypted, thankfully i had them saved on my external hdd

    • @couragecrusader7649
      @couragecrusader7649 Před 2 lety +2

      @@TheGamingChad. What do you guys install to get yourselves in these situations? Do you go on sketchy websites? I am not judging I just have gotten into modding and don't want to ruin my new laptop.

    • @Django0324
      @Django0324 Před rokem

      @@couragecrusader7649 answer this man!

    • @yatir3636
      @yatir3636 Před rokem

      i am currently 16 and my OneDrive, containing my research, is at same situation. wtf do i do🧎‍♀️🔥

  • @matthewroberts2788
    @matthewroberts2788 Před 2 lety +24

    I think the ultimate way around this is to just store any important/sensitive information in a secure cloud server environment (that doesn't sync with your computer) - just do it manually. No matter what happens to your computer, you should have a safe backup as well so that you can just format and restore to get the functionality back - but the whole time your data wouldn't even be in question. That's real peace of mind. Obviously there are other issues associated with keeping information in the cloud - but if you're using a unique secure password and 2FA with a good authentication app then there should be 0 concern. Any input is welcome though :)

    • @khanyasi
      @khanyasi Před rokem +1

      Auto syncing is absolutely fine as far as your backup cloud offers Ransomeware immunity or backup versioning.

  • @TheKingTywinLannister
    @TheKingTywinLannister Před 2 lety +27

    Great video!
    You forgot two important points.
    1) only way to be sure you system is clean is to nuke os from orbit. I mean clean reinstall deleting partitions.
    2) if you have system restore enabled, you might get files back using tools that can extract files from system restore. I have had success with this several times.

    • @nimalsenna
      @nimalsenna Před 2 lety

      which files?

    • @TheKingTywinLannister
      @TheKingTywinLannister Před 2 lety

      @@nimalsenna personal files, documents.

    • @karchikharval9741
      @karchikharval9741 Před 2 lety

      Am I to use system restore before or after reinstalling windows

    • @TheKingTywinLannister
      @TheKingTywinLannister Před 2 lety +4

      Clean install will delete all files including system restore data. Use USB to boot from and delete all partitions in hard Drive to preform total clean install.
      So you have to get files from system restore before clean install. So be careful not to infect newly extracted files. It might be smart to use safe mode. Then application named ShadowExplorer you can extract files if system restore was enabled. Move them to external usb drive and then you can clean install. If my explanation was too difficult then turn to professional for help.

  • @iamlegend68
    @iamlegend68 Před 3 lety +71

    Well there’s no guarantee that the authors of the ransomware would give you the encryption key even if you pay up. So you’re screwed either way.

  • @carloschaparro07
    @carloschaparro07 Před 4 lety +17

    CZcams is recommending me one of your videos called "My Security 2015", and I want to see your security in 2019.

  • @ripper12322
    @ripper12322 Před 2 lety +1

    I wish I had this a few years ago. I do know the basics of Ransomware but your links for help I would have loved. Thank you SO much! I have saved and shared!

  • @samwang4432
    @samwang4432 Před rokem

    still works! followed steps exactly and it works, thx a ton and keep up the awesome videos

  • @jeffmacdougall9190
    @jeffmacdougall9190 Před 3 lety +6

    This is the most informative video I have found with information that is extremely helpful in the efforts of dealing with ransomware attacks. My question for you is, how in good god do you have all of those actual ransomware files to execute??

  • @malwaretestingfan
    @malwaretestingfan Před 4 lety +23

    Thanks, Leo.

  • @therealthirst8099
    @therealthirst8099 Před 4 lety +5

    This is why Google Drive is so handy for me. Anything that I consider sensitive/irreplacable is always kept in a backup folder that I could access at any time. In case I switch to a new PC or if by some chance I am attacked by ransomware

  • @jakemacgregor-boyle6397

    Great video and just subscribed. Thank you.

  • @rickherrera5349
    @rickherrera5349 Před 4 lety +8

    Thank you for the great information. Our company just got hit last night. Turned every file to a ". Nortron " extension.
    I'll do the steps as you described. Hopefully the files can be decrypted.

  • @ericzhan3454
    @ericzhan3454 Před 3 lety +3

    Everybody gangsta until the decryption file you download is another ransomware

  • @KukursRobert
    @KukursRobert Před 3 lety +1

    Super useful high-level video, thanks!

  • @gotmyonu1027
    @gotmyonu1027 Před 4 lety

    Thanks for Sharing.... Really good to know how to react when hit by Ransomware....

  • @0bliviXx
    @0bliviXx Před 4 lety +83

    Someone should send this to the Louisiana government. They recently got hit hard by some ransomeware attacks

    • @Appoxo
      @Appoxo Před 4 lety +2

      @@ahsokaincognito Well, it's a government agency hit. They have the money ¯\_(ツ)_/¯

    • @Kajiyaification
      @Kajiyaification Před 4 lety +1

      @@Appoxo with elections coming up soon this is sad to hear

    • @malwaretestingfan
      @malwaretestingfan Před 4 lety

      @@ahsokaincognito Absolutely. It could be also Megacortex; also, most ransomware intrusion on companies are product of second intrusion and hacking.

    • @lesliesavege1206
      @lesliesavege1206 Před 4 lety +2

      @@Appoxo They have our money!

    • @Appoxo
      @Appoxo Před 4 lety +2

      @@lesliesavege1206 Communism intensifies

  • @ayushjain3993
    @ayushjain3993 Před 4 lety +21

    Hey! Thats a great video.
    However I have a question, What would you suggest for downloading the decryptor or checking the ID-Ransomware website when the infected device is off network. Also, most enterprise usually tend to block mass storage devices?
    What would you recommend?

  • @regismaltais8269
    @regismaltais8269 Před 2 lety +2

    i believe that the best protection is to use two external drive and alternate them and unplug them as soon as your backup is done

  • @laurieg1001
    @laurieg1001 Před 4 lety

    Very good work, thank you

  • @xerasferalos9784
    @xerasferalos9784 Před 4 lety +4

    I wish I saw this a few months ago when I had to deal with it. I got rid of the ransomware, reset and changed the network password and saved a couple files but i didn't figure out how to decrypt the files that got infected. In my case it was the .hese extension. Back in August. Good thing that I had a backup of my most important files but I lost a couple beautiful memories.

  • @amirulislam-dm7cj
    @amirulislam-dm7cj Před 3 lety +3

    Can I store some important "Ransomware (phobos) encrypted files" in another pc for further/future decryption without being infected??

  • @Docgy
    @Docgy Před 4 lety +2

    Good content 👍 For my sight I prefer back up solutions routine. Sperate from any source connect to internet.

  • @Kaelthas111090
    @Kaelthas111090 Před 4 lety +1

    Thank You kindly for the tips its kind of sad that these people will barely be punished, so lessen thier effectivness is noble deed. Can I ask how it works that files which take over your entire data are usually very small sized? and what are the most common ways to be infected? Sorry if thats silly question Im trying to be as cautious as I can but since Your Ccleaner video Im very stressed :)

  • @B5DIN
    @B5DIN Před 4 lety +3

    I needed that a month ago. I just reinstalled Windows and erased anything related to that piece of crap Ransomware. Thankfully I back up my files on a server separated from the attacked machine. And it forgot to actually encrypt my important data since I caught it mid-process when it was busy encrypting TEMP files x3

  • @grammargrill
    @grammargrill Před 4 lety +42

    I just checked ID Ransomware and it says it supports Spora, have they added support since you recorded this yesterday?

    • @pensive955
      @pensive955 Před 4 lety

      ... maybe

    • @-YakTheKuza
      @-YakTheKuza Před 4 lety

      from what i tried they dont have redeye or wannacry yet

    • @grammargrill
      @grammargrill Před 4 lety

      @@-YakTheKuza interesting. At first glance it looked like wanna cry was in the list of supported ransomware

    • @win10mc
      @win10mc Před 2 lety

      @@Samiozd thats not how it works it doesnt just check the name

  • @lesliesavege1206
    @lesliesavege1206 Před 4 lety +2

    I setup my computer to survive a virus attack without relying on an antivirus program, which I have been doing from the early days of Windows. I got hit with a ransomware in the early days of this malware. It encrypted all the Windows doc, text and image files, but my personal files were uninfected, which included my jpg files I saved for my photography business. I laughed at the message it showed on my screen demanding I pay them, because I had backups of everything on CDs. I didn't have to use these backups, because of the steps I took to alleviate the threat. I was impressed at the level of encryption it did to Windows informational files, and I had to reinstall Windows, but I lost none of my personal files.

    • @mithufeil
      @mithufeil Před 3 lety

      Is your personal files is on different partition or different disk?

  • @kendradaar8795
    @kendradaar8795 Před 3 lety

    I just started watching your videos and LOVE THEM! But I'm a dope when it comes to this stuff. When you say, "Lockdown infected computers in your Network" does that mean if my child's computer gets Ransomware on his tablet or laptop, my laptop or my other kids stuff can get infected? So everything hooked up on my ISP is now at risk?

    • @shaneme3
      @shaneme3 Před 2 lety

      Potentially.
      It depends on the software being used against you but it's completely possible.
      He is mostly talking about places with shared files across a network (think school computers and how they have a server where you can access files from any computer on that network.)

  • @unusuallyasian4070
    @unusuallyasian4070 Před 2 lety +13

    “Im gonna give a live demonstration, so were gonna infect this system with ransomware”
    *pulls out a whole folder of ransomwares*

  • @number1dstapp
    @number1dstapp Před 4 lety +5

    dang now i have a way to fight this kind of stuff since its been on the rise as of late.

  • @DilbertCronicles
    @DilbertCronicles Před 4 lety

    Just came across your channel and you have a new subscriber.

  • @LossyLossnitzer
    @LossyLossnitzer Před 4 lety

    Thank you - very informative

  • @karlbergen6826
    @karlbergen6826 Před 4 lety +11

    My brother had a laptop that was infected with ransonware some years ago. He got rid of it with a complete wipe and reload of his laptop.

    • @mrmacedon
      @mrmacedon Před 4 lety +4

      no shit, windows format is the only way

  • @abhiramshibu
    @abhiramshibu Před 4 lety +10

    if onedrive is mounted to documents , pictures, desktop, will the ransomware be able to encrypt that, if yes, is it recoverable from cloud

    • @m-faccin
      @m-faccin Před 4 lety

      Yes but you can restore these files very easily: support.office.com/en-us/article/Restore-your-OneDrive-fa231298-759d-41cf-bcd0-25ac53eb8a15

    • @vidzpit8264
      @vidzpit8264 Před 4 lety +2

      OneDrive has retention but only for a limited period of time, you should not use onedrive or any cloud file services as a backup system

    • @753238
      @753238 Před 4 lety

      one drive is not hackable at this moment we are doing this to use ai to hack shainghai

    • @meghapawar8755
      @meghapawar8755 Před 3 lety

      One drove is usefull but makes pc very slow

  • @jarecki83
    @jarecki83 Před 4 lety

    Is it safe to ask the ransomware authors to show the demo that thay can decrypt one file? Is it processed by email or do I have to install some suspicious software they give me?

  • @ramtek2702
    @ramtek2702 Před 4 lety

    How do you expect people to do all the things you suggest if their systems are frozen? The times I was hit I could not move from the demand screen. I had no internet access at all except on a different desktop computer.

  • @Contasecundaria32
    @Contasecundaria32 Před 3 lety +4

    since I formatted my computer after the attack my email accounts on social networks and even accounts that I didn't remember existed tried to be connected by strangers, what can that be?

    • @KunalSawant875
      @KunalSawant875 Před 2 lety +1

      Exactly same , my youtube channel started uploading videos which was logged in into my decrypted pc. Someone also tried using my Instagram and I am bit worried about my money as I do card payments from pc . Although the mail linked to Google pay was also in pc and I changed all of those account passwords , then also someone might use them for thier beneficiary. Plz reply me what all accounts and applications were compromised and need to secured

    • @bugginoutw2243
      @bugginoutw2243 Před 2 lety +1

      @@KunalSawant875 it’s very possible it was all broken into. Try to get into these accounts and change passwords + enable 2 step verification. Stop doing payment stuff on PC, do it on IPhone or something of that nature

    • @KunalSawant875
      @KunalSawant875 Před 2 lety +2

      @@bugginoutw2243 yes , I followed same path.first of all I changed all of my passwords even if they were not signed up into my pc. Then I went to my banks , met mangers and changed details for my online transactions. Also in one or two banks ,I made new account closing existing one.and last but not the least I made new bank account with very low balance just to do online transactions. it's been a while but thanks a lot for the reply!

  • @aircraftmaintenancerecords7371

    How much these criminals usually ask to decrypt your files?

    • @nuzzget
      @nuzzget Před rokem

      Really depends on the ransomware group, and depends if it's an individual or a business with cyber insurance.
      Fyi I only know that because the place I work at got hit with ransomware and I've been researching it since.

  • @r4microds
    @r4microds Před 2 lety +2

    Best case scenario, you actively back up your work and use external version control for any major project. Thus making it a simple case of wiping your drives and reinstalling your os.
    Worst case scenario, contact the ransom, ask for a demo to prove they arent just going to scam you further. Perhaps even pay a tiny fee to prove your intent of paying the full ransom.
    Take that demo to security expects to reverse engineer the ransom. What ever little you spent (if so) likely will help others in the long run.

  • @kkatharman
    @kkatharman Před 4 lety +2

    great video mate! just a question though, if i get attacked by ramsonware and i use microsoft onedrive (synchronized) will my files on cloud be encrypted too or are they safe? Thank you in advance for your time and keep up the good work!

    • @itzMiee
      @itzMiee Před 2 lety +2

      As of today, talking from experience, since I had OneDrive synchronized/connected to my pc when I got attacked I can tell you that your files won't be safe if they're connected to your pc. :')

    • @kkatharman
      @kkatharman Před 2 lety

      @@itzMiee thnx for the reply mate, i'll keep that in mind!

  • @JonathanPierce060994
    @JonathanPierce060994 Před 3 lety +4

    I notice you never brought up a full system restore.

  • @dot5687
    @dot5687 Před 4 lety +4

    Thank you. Now I'm calmer about my attack.

  • @jpteknoman
    @jpteknoman Před 4 lety +1

    you should also make a video on ransomware that locks the computer. my brother had a couple of them and i had to go through a few hoops to get them out without a format. as for data security, the best thing to do is get a 2TB+ USB drive (or more if needed), plug it in, make backups and then unplug it. this way you can be sure that nothing has access to the backups, then in case of ransomware, you deal with the problem and if no decryption is available you just restore the backups.

    • @YourSkyliner
      @YourSkyliner Před 2 lety

      And actually get at least two of these backup drives. Nothing sucks more than needing your backup and finding out the USB stick you put it on is dead.

  • @evadesc
    @evadesc Před 4 lety +1

    what's the best imaging/backup software to get a complete sector by sector image of your entire system? And, should the infected drive be wiped or zeroed out before an infected system get restored with an image?

    • @nexinex5918
      @nexinex5918 Před 3 lety +1

      Simple format is enough, u can use tools like Dd from linux system rescue... there are plenty of ways to save images of your partitions

  • @Josefuumii
    @Josefuumii Před 4 lety +19

    I’ve been pirating stuff for over a decade and not once have I ever had any virus/malware/ransomware, how do people even come across this sort of thing?

    • @minixlemonade2335
      @minixlemonade2335 Před 4 lety

      Dark web my guess

    • @spootymaniacs
      @spootymaniacs Před 4 lety +6

      just plainly not having an antivirus plus not worrying or being unknowing of any viruses, plus cyber security is more tougher than it was 10 years ago, 10 years ago it was easy for a naive kid back then like i was to download a harmful virus, got a rogue antivirus but luckily some youtube videos figured out the activation key and allowed me to rid the program.
      nowadays i havent had a virus since that incident i described. and even when downloading stuff i get VERY skeptical when my antivirus goes off even if its a false alarm. i always find reviews, ask friends, and if i have to, use a vm to make sure its safe or not.
      tbh i tend to get scared connecting my laptop even on my college wifi because those places can be easy breeding grounds for a massive virus spread, i always use my phone instead.

    • @Wahinies
      @Wahinies Před 4 lety +3

      The two primary vehicles I see working at an MSP are email related (attachments or links not yet identified by filters) and wide open remote desktop ports. The former we are training users against phishing with a service called KnowB4 that we launch phishing campaigns and get statistics on who goofed and how badly. Numbers have gone way down so it is successful.

    • @Matt0ize
      @Matt0ize Před 4 lety +1

      not necessarily, it just havent hit you yet or may be youre just lucky.. if you are using cracked software there maybe 80% chance of getting hit by ransomware

    • @Matt0ize
      @Matt0ize Před 4 lety

      how about you try downloading and install malwarebyte ..run a full scan and see whatchu got..

  • @ptyxx
    @ptyxx Před 4 lety +7

    Please don't pay ransom:
    All hackers: *triggered*

  • @SESPRODUCTION
    @SESPRODUCTION Před 2 lety

    Thanks for the information. But does randsomeware takes login informations?

  • @eddieoconnor4466
    @eddieoconnor4466 Před 4 lety +1

    My solution is to always have backups, and not backups from like..months ago, but bi-daily backups....in other words I have backups from Sunday-Monday, that I overwrite with backups for Tuesday-Wednesday...which get overwritten with backups for Thursday-Friday..etc...and I rotate them and keep it steady and even, I guess once you get into a rhythm with making / storing, and overwriting backups?...ransom ware becomes a thing of the past. There's also the fact that you MUST change ALL passwords when/if you get hit with ransom ware, (I always encrypt my passwords and use long complex, yet easily remember-able passwords too...not a word really but a phrase....like (not ever used by me...just using this for an example):
    Take your name....say...its "Timothy"....
    SPLIT it "Timo-thy"....
    Place something INSIDE your split name....like ...
    "scH001Bu5"......
    SPLIT that as well...
    "scH001-Bu5"
    in the middle of THAT?...place your birthdate...
    00/00/0000....but use underscores instead:
    00_00_0000
    so you now have "TimoscH00100_00_0000Bu5thy"......now...take THAT?..
    and ENCRYPT IT!...by the time someone cracks THAT?....you already have backups of your backups which are backups of your backups, and if they DO hit you with ransomware?...you can listen to some jazz, sip on some chilled wine...and smile as you restore your latest backup and change your passwords yet again.
    Just some simple advice from an old Network admin!...(sometimes..."simple" doesn't have to mean "vulnerable"!...LoL!!)

  • @muki_x
    @muki_x Před 4 lety +72

    If you don't care for data JUST REINSTALL WINDOWS FFS

    • @doomeR_007
      @doomeR_007 Před 4 lety +8

      Exactly what i did😂

    • @boibrainiac
      @boibrainiac Před 4 lety +3

      SAME. Haha
      i think almost everyone does that. simple and easy. everyone's just bieng techy in the comments LOL

    • @kurianbiju1294
      @kurianbiju1294 Před 4 lety

      Same

    • @travaa54
      @travaa54 Před 4 lety +7

      How did you guys get ransomware?

    • @hiteshmodhwadia2084
      @hiteshmodhwadia2084 Před 4 lety

      Same I did 🤣🤣🤣

  • @bouda_group
    @bouda_group Před 4 lety +6

    You can do system restore on Windows also!!

    • @MrEvilWasp
      @MrEvilWasp Před 4 lety +1

      Yeah that's what i did about 2 years ago. I simply rolled windows back to the day before. Don't know if it works every time but it worked for me.
      Peace

    • @thatguyyouseeeverywhere8886
      @thatguyyouseeeverywhere8886 Před 3 lety +1

      Not really some ransonware will not let you system restore

    • @shadowguardian3612
      @shadowguardian3612 Před 3 lety +1

      @@thatguyyouseeeverywhere8886 then format the drive or if not just open the pc and take it out go and put another one if you have one

  • @leonjones7120
    @leonjones7120 Před 3 lety

    This is an excellent source of information and very well explained.

  • @mateuszzawisza8425
    @mateuszzawisza8425 Před 4 lety

    my father's accounting office got hit by barak ransomware, but he didn't get any ransom note, have you heard about similar situations? also could you recommend any good programs for restoring files? thanks a lot!

  • @jamesberkhimer5751
    @jamesberkhimer5751 Před 4 lety +5

    Since my systems do not have sensitive files I just do a full wipe and reboot

    • @azlankhan2356
      @azlankhan2356 Před 3 lety

      Neither do I, but i had a lot of games and movies on my device. Losing files can be heartbreaking y'know.

  • @hansfox
    @hansfox Před 4 lety +8

    Merry christmas to you and family and a happy free virus 2020 year , greetings from hans of the dutch lowlands nl 👍👌

    • @RVxCobra
      @RVxCobra Před 3 lety +4

      "free virus 2020 year"
      This comment definitely did not age well

    • @bucket8967
      @bucket8967 Před 3 lety +1

      Kian Santang Kusumah ikr

  • @jerryg50
    @jerryg50 Před 4 lety

    I keep a number of backup images for my computers. The images are on drives that must be manually connected to the computers to restore. If I have any reason to restore a computer, I first boot on the Windows repair start DVD and then I connect the image drive. I then run the utility to restore the computer.

  • @someone4212
    @someone4212 Před 3 lety +12

    Note: Do not execute any virus on real computer, use virtual machine or dont execute them at all. It's for your safety.

    • @16bitdude36
      @16bitdude36 Před 2 lety +2

      Don't forget to close your internet connection, and make sure the malware can't leak from the vm

  • @LiEnby
    @LiEnby Před 3 lety +4

    "Half the time the ransomware will encrypt your backup once u connect it to your PC"
    *Laughs in stack of DVD-R's*

    •  Před 3 lety

      Read-only cloud storage is also nice ;)

    • @LiEnby
      @LiEnby Před 3 lety

      @ then your just trusting someone else to hold all your data for you .-.

    • @TheGamingChad.
      @TheGamingChad. Před 2 lety

      that sounds scary, but i did the following, i got encrypted 2 days ago, first time actually, AFTER rebooting my pc i connected my external drive to my computer to transfer all my files to the computer again, am i good to go or did i do it anything wrong? and while my computer had ransomware i managed to move some stuff to my phone using an usb cable, my phone was not encrypted

    • @00and
      @00and Před 2 lety

      If you are planning to put everything on DVD's, why bother, buy a Blu-ray drive and couple of those double layer double side 100GB discs

  • @berendberend702
    @berendberend702 Před rokem +1

    Can someone explain to me how to exactly do this at 0:40, does it just mean disconnecting from the internet? I'm not very good with computers so I don't quite know how to do this. I haven't been hit by ransomware btw, but I just wanted to know if my laptop ever gets infected by ransomware.

  • @evaamandasamlie1718
    @evaamandasamlie1718 Před rokem

    production. Thanks again!

  • @xarcatic3710
    @xarcatic3710 Před 4 lety +17

    1:05
    *pulls out my grandfather's life support*

    • @j1pp
      @j1pp Před 4 lety +1

      this comment is so underrated.

  • @fatsmoke7820
    @fatsmoke7820 Před 3 lety +3

    will they know my ip address ?? i have the .booa virus on my pc and my pc dont have any important stuffs so lol

  • @marc-andreservant201
    @marc-andreservant201 Před 2 lety +2

    Backups, backups, backups. Ransomware won't be able to touch your AWS S3 objects (unless it knows your root account password, in which case data loss is the least of your worries). It also won't encrypt your external hard drive unless it's plugged into your machine at that moment.

    • @alastorclark3492
      @alastorclark3492 Před 2 lety

      redundancy with randomly generated passwords saves that. ive got 3 accounts with a password i cant even remember and if they can get to the locked flash drive in a place i shant say to get to them...welll

  • @ruined_life2671
    @ruined_life2671 Před 3 lety +1

    Heya I know I this a bit off topic but i am just wondering. I tried opening discord and then a application error popped up, it says this "the instruction at 0x0000000000000076CAO63E referenced memory at 0x0000000006F532778 the required data was not placed into memory because of an I/O error status of 0xc000000242.
    Click ok to terminate program"
    How do you fix this?

  • @pancakes2454
    @pancakes2454 Před 4 lety +6

    the dislikes are ransomware makers

  • @widyaargarini5765
    @widyaargarini5765 Před 4 lety +5

    This Video : **Exists*
    Me : Dont Use Computer lol

  • @mtndew490
    @mtndew490 Před 3 lety

    Are your accounts (minecraft, battlenet, discord, etc) protected? is iot just your documents and images that get screwed?

  • @ayushsingh2623
    @ayushsingh2623 Před 4 lety

    Helpful Video Leo

  • @somethingcoolgoeshere
    @somethingcoolgoeshere Před 4 lety +3

    i dont store super secret stuff on my computer so if i ever get ransomware i have no problem doing a factory reset
    they got my anime wallpapers

  • @Starlesslemon
    @Starlesslemon Před 4 lety +5

    I just keep all important files on flash drives. If I was infected I would long format the drive and then reinstall windows.

    • @vidzpit8264
      @vidzpit8264 Před 4 lety +1

      Ransomware will typically encrypt any devices connected to infected systems

    • @Starlesslemon
      @Starlesslemon Před 4 lety +1

      @@vidzpit8264 no shit. I'm saying my files are stored on flash drives. I don't leave them plugged in 24/7. I plug them in when I want to use the files, then unplug them.

  • @kriskiireonsitakschill1732

    Can you tell me what are some places where ransomware can infect you and also can i just format c if I don’t have any files i care about as i only have games.
    Im not very tech savvy so I’d love if someone explained this to me

  • @loramservices
    @loramservices Před 2 lety

    By recent past experience on a ransomware attack, I would recommend urgently to keep up-to-date the bios of the computer. It seems this was the only door open to get infected.

  • @PokeMaster22222
    @PokeMaster22222 Před 4 lety +4

    Backup your computer regularly, people! My high school recommended doing so every Friday, so that's what I've done for years.

  • @playboi_caid8301
    @playboi_caid8301 Před 3 lety +4

    I remember getting ransomware on my computer like 10 years ago from downloading Terrordrome, CSGO, and Fallout 2 on super sketchy sites💀

  • @soleilgraphics
    @soleilgraphics Před 3 lety

    A few months ago I got hit by one with the .boop extension so I basically have 2 TB of data encrypted, that includes approximately 15 years of pictures. The two infected drives are lying here on my desk. I have a new drive in my machine but I operate from home so my work files are on those drives. I became complacent and wasn't backing up as I used to.

  • @GeGeAiNi
    @GeGeAiNi Před 2 lety

    I don't have any imp docs but I just want to make sure my pc is usable.is it safe to still use the pc?

  • @moth.monster
    @moth.monster Před 4 lety +8

    Step 0: Have backups
    Step 1: Nuke the install from orbit
    Step 2: Install Linux instead
    (I'd reccomend Linux Mint if you're used to Windows.)

    • @sybrenvandenakker9064
      @sybrenvandenakker9064 Před 4 lety +1

      @Leon Voerman most common ransomware is made for Windows, so it doesn't work on oinux

    • @aranud8907
      @aranud8907 Před 4 lety

      @@sybrenvandenakker9064 www.notebookcheck.net/Lilu-Lilocked-ransomware-has-now-infected-thousands-of-Linux-servers.434547.0.html

    • @smellymomo
      @smellymomo Před 4 lety

      Step 2 can only be implemented if you don't need Windows specific softwares. It's great for people who do some web surfing, watch videos and stuff. And as you mentioned, with distros like Mint and Ubuntu, linux has become extremely user friendly.

    • @moth.monster
      @moth.monster Před 4 lety

      @@smellymomo if you REALLY need a certain bit of windows software, use a VM or dual boot. just make sure that the windows VM/partition does not have access to your linux drives (hard to do anyways since windows hates anything to do with linux)
      if you need to transfer files between them, mount the windows partition in linux and move files there. always keep the files under linux and also a cold backup too if you wanna be extra safe (a drive that's unplugged most of the time)

    • @death03125880
      @death03125880 Před 4 lety

      There are thingies for linux as well, trust me on that one.

  • @robinsonedward6646
    @robinsonedward6646 Před 2 lety +3

    Honestly, just owning it and not trying to hide it is partially
    why I watch you. It's the honorable thing to do and it make
    the rest of the jobs much more believe when you are call
    out of the spots like that, so thank you #davkracks.

  • @Mike01010011
    @Mike01010011 Před 3 lety

    Very useful vid. Thanks

  • @AkillEasy
    @AkillEasy Před 4 lety

    Okay so the problem with me is that I download the decryptor for Stop(DJVU) but it won't start/open. Do you know any solution for that?

  • @gokulram9188
    @gokulram9188 Před 3 lety +1

    Thankyou very much for uploading this video but sadly my version of ransomware isnt decrytable !

  • @rhdtv2002
    @rhdtv2002 Před 3 lety +1

    I saw personally what ransomware can do to a company. I'm curious about things such as One Drive local files from SharePoint/Teams that can get hit by a ransomware on a client PC - would Microsoft recognize a sync over to the cloud service and stop that from moving over?

    • @pineappleroad
      @pineappleroad Před 2 lety

      athough i am not sure if the system would detect that the files had been encrypted, most cloud storage services (including onedrive and google drive) have file versions, im not sure how it works with onedrive, but with google drive older versions are usually stored for at least 30 days

  • @REy..
    @REy.. Před 2 lety

    After watching some youtube videos .. I tried to decrypt it but it says Id is online decryption is impossible .... Does formatting my computer will remove the ransomware ?

  • @rbrojas2040
    @rbrojas2040 Před 2 lety

    If you have dropbox accessible at all times on your computer, does ransomware encrypt that also? (even though the files reside within the cloud)

    • @alastorclark3492
      @alastorclark3492 Před 2 lety

      No. Though i suggest MEGA for better security and more free memory than what dropbox offers and works just like onedrive does (acts like a folder inside your file explorer)

  • @level_yz
    @level_yz Před 4 lety

    if you pay for the dycrypter is it an executable or what like is it possible to hand over to sucurity experts so they can use it in the future or what?

    • @bucket8967
      @bucket8967 Před 3 lety +1

      Do not pay them, they are most likely gonna keep asking for more money. A last ditch method would be to formatting your pc and reinstalling windows

  • @adrae159
    @adrae159 Před 3 lety

    Hello I was recently attacked by downloading a bad file from internet, I got the ransomware attacked + Pop-up adds on Chrome. Thank God I have my Data on a hard Drive so It won't be a problem, but I'm questioning if formatting my laptop will remove the pop-up sites on Chrome or will they remain on Google? (uBlock is blocking 68 pop-ups on this video) Please help and thanks for the vid.

  • @mike_dft1267
    @mike_dft1267 Před 4 lety +1

    thx for this video :)

  • @rationalbushcraft
    @rationalbushcraft Před 4 lety +1

    So in other words if there is a repair tool for the ransomware you have then you can repair the files if not restore from backup. This is a good reason to back up to a NAS device that uses unique login credentials and is not part of the domain. I have seen people get their backups encrypted too so no way to recover short of paying the ransom.

  • @shamir4900
    @shamir4900 Před 3 lety

    So there are some files in my computer who are encrypted but i dont need those files and i want to delete them to get more space, There are some text files saying that something bad will happend if i delete them, Somehow it din't infect like main files like games etc i think i actually got rid of some of it with an antivirus but others are still encrypted, What should i do?.

  • @jerryg50
    @jerryg50 Před 3 lety +1

    I keep isolated system backups. I would do a restore using a full wipe of the partition before restoring.

  • @farhanjamal4269
    @farhanjamal4269 Před 2 lety

    Thank you bro.
    My data files infected by iisa (dajavu Ransom )
    Now I would decript my files.
    😘

  • @skarthick6
    @skarthick6 Před 2 lety

    Hi, my client has been impacted by Cuba Ransomware. Is there any recovery possible? Are there any decryption tools?

  • @jamief6507
    @jamief6507 Před 4 lety

    Hello friend, after you have ran the process, and it encrypts your files, is it possible to do Task Manager-Find random process- Create memory dump and the encryption key will be in there? But when it creates the memory dump file, will it encrypt that?

    • @richardg8376
      @richardg8376 Před 2 lety

      I don't think that will help unfortunately. Most encryption uses a public and private key pairing. The public key is used to encrypt the data and the private key is needed to decrypt it.
      You might be able to obtain the public key this way, but that will be useless to decrypt them: you will still need the private key which will be held by the scammers and likely won't be part of the software itself so it can't be reverse engineered and obtained.