{"id":7243,"date":"2017-04-05T08:30:10","date_gmt":"2017-04-05T16:30:10","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/05\/news-1034\/"},"modified":"2017-04-05T08:30:10","modified_gmt":"2017-04-05T16:30:10","slug":"news-1034","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/05\/news-1034\/","title":{"rendered":"How to rescue your PC from ransomware"},"content":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2014\/01\/freefromransomware_primary-100224662-medium.jpg\"\/><\/p>\n<p><strong>Credit to Author: Eric Geier| Date: Mon, 03 Apr 2017 17:51:00 -0700<\/strong><\/p>\n<p>With \u00a0nasty malware like <a href=\"http:\/\/www.pcworld.com\/article\/3042580\/security\/locky-ransomware-activity-ticks-up.html\">Locky<\/a>\u00a0making the rounds\u2014encrypting its victims\u2019 files, and then refusing to unlock them unless you pay up\u2014ransomware is a serious headache. But not all ransomware is so difficult.<\/p>\n<p>You can remove many ransomware viruses without losing your files, but with some variants that isn\u2019t the case. In the past I\u2019ve discussed general steps for\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/243818\/how_to_remove_malware_from_your_windows_pc.html\">removing malware and viruses<\/a>, but you need to apply some specific tips and tricks for ransomware.\u00a0The process varies and depends on the type of invader. Some procedures involve a simple virus scan, while others require offline scans and advanced recovery of your files. I categorize ransomware into three varieties: scareware, lock-screen viruses, and the really nasty stuff.<\/p>\n<p>An example of a fake antivirus app.\u00a0<\/p>\n<p>The simplest type of ransomware, aka scareware, consists of bogus antivirus or clean-up tools that claim they\u2019ve detected umpteen issues, and demand that you pay in order to fix them. Some specimens of this variety of ransomware may allow you to use your PC but bombard you with alerts and pop-ups, while others might prevent you from running any programs at all. Typically these invaders are the easiest type of ransomware to remove.<\/p>\n<p>The Kovter ransomware locks down your computer, displaying a fake notice claiming to be from several government authorities.\u00a0<\/p>\n<p>Next is the ransomware variety I call lock-screen viruses, which don\u2019t allow you to use your PC in any way. They display a full-size window after Windows starts up\u2014usually with an FBI or Department of Justice logo\u2014saying that you violated the law and that you must pay a fine.<\/p>\n<p>A ransomware program called Locky has quickly become one of the most common types of malware seen in spam.<\/p>\n<p>Encrypting malware\u2014such as Locky\u2014is the worst variant, because it encrypts and locks your personal files until you pay up. But even if you haven\u2019t backed up your files, you may have a chance to recover your data.<\/p>\n<p>Before you can free your hostage PC, you have to eliminate the hostage taker.<\/p>\n<p>If you have the simplest kind of ransomware, such as a fake antivirus program or a bogus clean-up tool, you can usually remove it by following the steps in my previous <a href=\"http:\/\/www.pcworld.com\/article\/243818\/how_to_remove_malware_from_your_windows_pc.html?page=0\">malware removal guide<\/a>. This procedure includes entering Windows\u2019 Safe Mode and running an on-demand virus scanner such as <a href=\"http:\/\/www.pcworld.com\/article\/188005\/malwarebytes_antimalware_free_detects_and_removes_malware_on_command.html\">Malwarebytes<\/a>.<\/p>\n<p>If the ransomware prevents you from entering Windows or running programs, as lock-screen viruses typically do, you can try to use <a href=\"http:\/\/www.pcworld.com\/article\/221114\/how_to_repair_your_windows_pc_with_system_restore.html\">System Restore<\/a> to roll Windows back in time. Doing so doesn\u2019t affect your personal files, but it does return system files and programs to the state they were in at a certain time. The System Restore feature must be enabled beforehand; Windows enables it by default.<\/p>\n<p>You can usually bring up the Advanced Boot Options of Windows 7 by pressing F8 during booting.<\/p>\n<p>To start the restoration process using System Restore, follow these steps depending on your OS version:<\/p>\n<p>You can get to the recovery options of Windows 8, 8.1, and 10 by holding shift when rebooting from the Windows login screen.<\/p>\n<p>If you can\u2019t get into the recovery screens, you can use the Windows installation media (disc or USB drive) for your particular version\/edition to access the recovery tools. You\u2019d boot up to that install media, but click\u00a0<em>Repair your computer<\/em>\u00a0on the main menu before proceeding with the installation. Alternatively, you can\u00a0create a Windows System Repair Disc\u00a0on another PC running the same Windows version, and then boot to that disc on the infected PC to reach the same recovery tools. We\u2019ve previously discussed this process for <a href=\"http:\/\/www.pcworld.com\/article\/185500\/Make_Your_New_PC_HassleFree_Part_1_Create_a_SystemRepair_Disc.html\">Windows 7<\/a>, <a href=\"http:\/\/www.pcworld.com\/article\/2041569\/how-to-create-a-bootable-windows-8-recovery-tool.html\">Windows 8<\/a>, and <a href=\"http:\/\/www.pcworld.com\/article\/3016562\/computers\/when-you-cant-create-the-windows-10-recovery-drive-try-these-three-fixes.html\">Windows 10<\/a>.<\/p>\n<p>If System Restore doesn\u2019t help and you still can\u2019t get into Windows to remove the ransomware, try running a virus scanner from a bootable disc or USB drive; some people refer to this approach as an offline virus scan. My favorite bootable scanner is from\u00a0<a href=\"http:\/\/www.bitdefender.com\/support\/how-to-create-a-bitdefender-rescue-cd-627.html\">Bitdefender<\/a>, but more are available:\u00a0<a href=\"http:\/\/www.avast.com\/en-us\/faq.php?article=AVKB114\">Avast<\/a>,\u00a0<a href=\"http:\/\/www.avg.com\/us-en\/avg-rescue-cd\">AVG<\/a>,\u00a0<a href=\"http:\/\/www.avira.com\/en\/download\/product\/avira-rescue-system\">Avira<\/a>, <a href=\"http:\/\/support.kaspersky.com\/viruses\/rescuedisk\">Kaspersky<\/a>,\u00a0<a href=\"https:\/\/security.symantec.com\/nbrt\/nbrt.aspx\">Norton<\/a>, and\u00a0<a href=\"http:\/\/www.sophos.com\/en-us\/support\/knowledgebase\/52053.aspx\">Sophos<\/a>\u00a0all offer antivirus boot-disk software.<\/p>\n<p>Bitdefender\u2019s antivirus boot disk in action.<\/p>\n<p>If you still have no luck after trying Safe Mode and an on-demand scanner, performing a System Restore, and running an offline virus scanner, your last resort is likely to perform a\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/2364269\/windows\/how-to-reinstall-windows-like-a-pro.html\">full restore<\/a> or <a href=\"http:\/\/www.pcworld.com\/article\/3042481\/windows\/how-to-clean-install-windows-the-right-way.html\">clean re-install of Windows<\/a>. Most ransomware isn\u2019t that tenacious, however.<\/p>\n<p>Showing hidden files in Windows 7 takes a couple of clicks.<\/p>\n<p>With that out of the way, it\u2019s time to repair the damage. If you\u2019re lucky, your PC was infected by malware that didn\u2019t encrypt your data. If it appears you\u2019re missing stuff though, the malware may have merely hid your icons, shortcuts, and files. It usually does this by making the files \u201chidden.\u201d Here\u2019s how to check, depending on your OS version:<\/p>\n<p>Showing hidden files in Windows 8 and after is a cinch.<\/p>\n<p>If your data reappears after you elect to show hidden files, that\u2019s great\u2014it means there\u2019s an easy fix for your woes. Open\u00a0<em>Computer <\/em>or<em> File Explorer<\/em>, navigate to C:Users, and open the folder of your Windows account name. Then right-click each folder that\u2019s hidden, open\u00a0<em>Properties<\/em>, uncheck the\u00a0<em>Hidden<\/em>\u00a0attribute, and click\u00a0<em>OK.\u00a0<\/em>Boom! Done.<\/p>\n<p>If you still can\u2019t find your data, and your files really have been malware-encrypted, you\u2019re in trouble. Usually it isn\u2019t possible to just decrypt or unlock your hostage files, because the decryption key is typically stored on the cybercriminal\u2019s server. Some victimized users have reported that some pieces of malware will keep their promise, decrypting and returning your files once you pay, but I don\u2019t recommend paying.\u00a0<\/p>\n<p>This is why we constantly tell you to\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/2905400\/windows\/3-easy-steps-anyone-can-take-now-to-back-up-a-pc.html\">back up your PC<\/a>\u00a0on a regular basis.<\/p>\n<p>If you previously set and created backups, scan them for viruses on another PC (one that is\u00a0<em>not<\/em>\u00a0infected) if at all possible. If all of your important files are backed up, you can proceed in removing the malware and then simply restoring your backed-up files.<\/p>\n<p>If you don\u2019t have a backup system in place, you might be able to recover\u00a0<em>some<\/em>\u00a0files from Shadow Volume Copies\u2014if the malware hasn\u2019t deleted them. Shadow Volume Copies is part of Windows\u2019 System Restore feature. Either right-click\u00a0on the<em>\u00a0<\/em>files or folders you want to restore\u00a0and open\u00a0<em>Properties<\/em>\u00a0to view the Previous Versions list, or use a program called\u00a0<a href=\"http:\/\/www.shadowexplorer.com\/downloads.html\">Shadow Explorer<\/a>\u00a0to browse the snapshots.<\/p>\n<p>But don\u2019t rely on that. Start backing up your PC today, and do it regularly.<\/p>\n<p>Avoiding ransomware is much the same as avoiding other types of other malware.<\/p>\n<p>Always run a\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/3166557\/software-security\/the-best-consumer-antivirus-products-of-2016-are-avira-and-norton-test-labs-say.html\">good antivirus utility<\/a>\u00a0and keep Windows and browser-related components (Java, Adobe, and the like)\u00a0updated.\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/2046454\/how-to-clean-and-secure-your-browser-like-a-pro.html\">Keep your browser clean<\/a>\u00a0of junk toolbars and add-ons to prevent adware invasions that could lead to malware infections. Always,\u00a0<em>always<\/em>\u00a0be wary of unexpected email attachments and spam.<\/p>\n<p>And just to beat this dead horse one more time: Always have a good backup system in place, just in case your PC does become infected and you can\u2019t recover your files. Yes, it\u2019s that important.<\/p>\n<p><em>Editor&#8217;s note: This article was oroginally published January 13, 2014, and updated April 3, 2017.<\/em><\/p>\n<p class=\"orig\">This story, &#8220;How to rescue your PC from ransomware&#8221; was originally published by <span itemprop=\"publisher\" itemscope itemtype=\"http:\/\/schema.org\/Organization\"><span class=\"publisher\" itemprop=\"name\"><a href=\"http:\/\/www.pcworld.com\/\" rel=\"nofollow\" target=\"new\">PCWorld<\/a><\/span><\/span>.<\/p>\n<p><a href=\"http:\/\/www.computerworld.com\/article\/3187889\/security\/how-to-rescue-your-pc-from-ransomware.html#tk.rss_security\" target=\"bwo\" >http:\/\/www.computerworld.com\/category\/security\/index.rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/zapt1.staticworld.net\/images\/article\/2014\/01\/freefromransomware_primary-100224662-medium.jpg\"\/><\/p>\n<p><strong>Credit to Author: Eric Geier| Date: Mon, 03 Apr 2017 17:51:00 -0700<\/strong><\/p>\n<article>\n<section class=\"page\">\n<p>With \u00a0nasty malware like <a href=\"http:\/\/www.pcworld.com\/article\/3042580\/security\/locky-ransomware-activity-ticks-up.html\">Locky<\/a>\u00a0making the rounds\u2014encrypting its victims\u2019 files, and then refusing to unlock them unless you pay up\u2014ransomware is a serious headache. But not all ransomware is so difficult.<\/p>\n<p>You can remove many ransomware viruses without losing your files, but with some variants that isn\u2019t the case. In the past I\u2019ve discussed general steps for\u00a0<a href=\"http:\/\/www.pcworld.com\/article\/243818\/how_to_remove_malware_from_your_windows_pc.html\">removing malware and viruses<\/a>, but you need to apply some specific tips and tricks for ransomware.\u00a0The process varies and depends on the type of invader. Some procedures involve a simple virus scan, while others require offline scans and advanced recovery of your files. I categorize ransomware into three varieties: scareware, lock-screen viruses, and the really nasty stuff.<\/p>\n<p class=\"jumpTag\"><a href=\"\/article\/3187889\/security\/how-to-rescue-your-pc-from-ransomware.html#jump\">To read this article in full or to leave a comment, please click here<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[11062,10643],"tags":[11072,11073,714],"class_list":["post-7243","post","type-post","status-publish","format-standard","hentry","category-computerworld","category-independent","tag-cybercrime-hacking","tag-malware-vulnerabilities","tag-security"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7243","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7243"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}