Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

How to tell if you've been hit by fake ransomware

Fahmida Y. Rashid | May 2, 2016
Ransomware is no joke, but sometimes, amateur attackers use 'pretend' ransomware -- and you can get your data back easily.

Unlike most malware, ransomware is not stealthy. It's loud and obnoxious, and if you've been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.

“Your personal files are encrypted,” the message on the computer blares. “Your documents photos, databases, and other important files have been encrypted with strongest encryption and unique key, generated for this computer.” While the language may vary, the gist is the same: If you don’t pay the ransom -- typically within 48 to 72 hours -- your files are hosed.

Or are they? There is a slim possibility the perpetrators may be trying to fake you out and the files haven’t been encrypted. While not a common scenario, it does happen, according to industry experts. Rather than paying up, you can bypass the scary fake message and move on with your day.

“There are a number of examples where true encryption doesn’t occur. Instead, cyber criminals rely on the social engineering edge of the attack to convince people to pay,” warns Grayson Milbourne, director of security intelligence at Webroot.

Is it real or fake?

It takes only a few seconds to confirm whether it’s a real infection or a social engineering scam.

If the ransom demand includes the name of the ransomware, then there’s no mystery, and you're in trouble. Ransomware families that identify themselves include Linux.Encoder -- the first Linux-based ransomware -- which clearly says “Encrypted by Linux.Encoder.” CoinVault identifies itself by listing the support email address. TeslaCrypt and CTB-Locker are also among the well-known ransomware families that tell you who is holding your files hostage.

But there are plenty of ransom plays that don’t bother with names. For example, CryptoLocker simply warned that your files have been encrypted and never flaunted its name. Instead, you'll have to look for other clues: Is there a support email address? Search the Internet for the bitcoin payment address or the actual ransom message and see what comes up on forums or from security researchers.  

If you can't identify the ransomware, then there's a chance it could be fake. In such cases, your files aren't actually encrypted; the attacker simply pops up a scary message and locks the screen. The ransom demand typically shows up inside a browser window and doesn’t let the user navigate away, or it locks the screen and displays a dialog box asking for an encryption key. Because the victim can’t close the message, it looks real.

If it’s possible to close out of the screen using key commands, such as Alt-F4 on Windows and Command-W on Mac OS X, then the ransom demand is fake. Or try force-restarting the device and see if the message goes away.

 

1  2  Next Page 

Sign up for CIO Asia eNewsletters.