PROXIMANOVA-LIGHT.OTF PROXIMANOVA-LIGHTIT.OTF PROXIMANOVA-EXTRABLD.OTF PROXIMANOVA-BOLD.OTFPROXIMANOVA-BLACK.OTF
Get this font in here!
Ransomware
Ransomware refers to malicious software that encrypts important files on a device and then threatens to publish the victim's data or perpetually block access to it unless a ransom is paid. Even after paying the ransom, there is no guarantee that you can recover your files. The best protection against this type of malware is to keep separate backups in a location not on your main network.
First Steps
Immediately disconnect ransomware-infected devices physically from the network to prevent other devices in your network from getting infected.
Our virus lab is unable to decrypt any encrypted files affected by ransomware, nor do these encrypted files contain any useful data to add to our virus definitions. Removing ransomware is usually not required because most ransomware often delete themselves after executing (running). However, sometimes secondary malware is installed to attack the system again or allow further breaches. For this reason, the best start when cleaning infected devices is to identify the ransomware variant that attacked your devices. You can use one of the following tools:
Once identified, you may know what common locations any remaining infection may occupy, the scope of the attack, and whether or not a decryption tool exists that would allow you to recover your files. As a general practice in the security community, any decryption tools that have been developed are usually shared by the developer for free. To get our free ransomware decryption tools, see this Avast page.
Identifying Attack Sources
Identifying the infection may also allow you to identify potential sources of the attack. Identifying the source will be important because as you move forward, your primary concern should be a second attack rather than the same infection persisting. Below is some information about areas you can check in order to harden against/investigate the attack.
RDP Ports
Many hackers are successful at abusing open RDP ports. Even when the Administrator password is not known, the password may be brute forced if the RDP port is open to the public and your current security policy allows this. When the Administrator password appears to have been used, you should assume that it has either been guessed or stolen. In either case, it is highly recommended that administrator passwords are reset.
Passwords are commonly stolen through phishing, and reviewing company email policy may be a good step towards hardening against attacks. Lastly, reviewing user activity in Windows logs can help you determine what user account was used to initiate the attack.
Operating System Vulnerabilities
If your site is secured with a firewall, it may be advisable to close your site to SMB connections unless strictly required for operation.
Lastly, many ransomware attacks leverage vulnerabilities inherent to the Windows operating system. Sensitive to these attacks, Microsoft attempts to patch known vulnerabilities as quickly as they are found. With this in mind, it is always advisable to keep Windows as up-to-date as your site security policy will allow.
Avast and AVG Business Patch Management can help keep your operating system and applications up-to-date to close vulnerabilities.
Recovering From Ransomware
Unless you have a secure, preferably off-site backup solution for your devices and their important files, you may not be able to recover any encrypted files after a ransomware attack. We always recommend using secure backups to ensure your company can quickly recover.
Following a ransomware attack:
- Immediately disconnect infected devices physically from the network to prevent other devices on your network from getting infected
- Format and reinstall the operating system(s) on all infected devices
- We do NOT recommend manually removing the virus
- Restore files from unaffected offsite/online data backups
Once your site has been cleaned and secured, we can try to verify the infection will not be allowed again. Though definition scanning can be notoriously difficult to use in reference to ransomware, we can always use any samples of the malware to create new definitions for the attack. If you find any remnants of the malware that were not detected by us, please submit the samples to our Threat Labs for analysis (for detailed instructions, see Submitting Malware Samples). We will also use any gathered information to improve our ransomware defenses when possible.
Protecting Devices with Ransomware Shield
Ransomware Shield is currently offered as part of Avast Small Business Solutions only (Essential, Premium, and Ultimate Business Security).
Ransomware Shield helps secure your personal photos, documents, and other files from being modified, deleted, or encrypted by
Note that Ransomware Shield is not a ransomware decryption tool - it is designed to prevent the infection by protecting your files and folders, but it cannot decrypt files already encrypted by ransomware. To get our free ransomware decryption tools, see this Avast page.
See Ransomware Shield to learn how to configure this Antivirus component on your end devices via Avast Business Hub, or Ransomware Shield to configure it via the local client.
Other Articles In This Section:
Installing Avast Agent on Deprecated Windows Systems
Business Support Remote Sessions
Analyzing Performance Issues on Windows
Enabling Debug Logging for Antivirus
Related Articles: