« What's Going on in the Markets September 9 2016 | Main | Protect Your Future Income »

Beware of the Rise of Ransomware

On March 31, 2016, the U.S. Department of Homeland Security, in collaboration with the Canadian Cyber Incident Response Centre, issued a joint alert on ransomware (1).  Less than one month later, anti-malware maker Enigma Software reported that April 2016 was the “worst month for ransomware on record in the U.S.” (2).  In an effort to increase awareness to this ever-growing cybersecurity threat, I'd like to share the below information with you today:

What is Ransomware?

According to the U.S. Computer Emergency Readiness Team (“US-CERT”), ransomware is a specific type of malicious program (i.e., a virus) where the victim’s computer, network, and/or files become strongly encrypted to the point they are effectively rendered useless.  Shortly after the victim realizes what happened, he or she typically receives a message demanding a ransom in exchange for restoring access to the affected systems and data.

How is Ransomware Spread?

According to US-CERT, ransomware can be spread through e-mails that contain the malicious program or contain links to an infected website, or through messages or links sent through social media; however, in some recent variants, ransomware was spread by means of a “drive-by download attack,” which occurs when an attacker covertly “injects” an ordinary website—usually a trusted or popular website—with malicious code, which, in turn, is  downloaded and installed on unsuspecting visitors’ computers.  An October 2014 article in SecurityWeek magazine explains that many drive-by download attacks target users running out-of-date or older versions of common software programs; users who fail to promptly install the most current security patches can also easily fall victim to this method of attack (3).


According to Kaspersky Lab, cybersecurity experts found that in 2015, one in three business computers was exposed at least once to an internet-based attack; during that same timeframe, more than 50,000 corporate machines fell victim to ransomware attacks (4).  Businesses, however, haven’t been the only target. According to the FBI, victims have included hospitals, school districts, state and local governments, and law enforcement agencies (5).  In short, anyone with a computer and internet access could potentially become the next victim of a ransomware attack.


Enigma Software and US-CERT provided recommendations to help minimize the impacts of a ransomware attack, including:

1.    Back up your data regularly (at least weekly) to an external device that isn’t regularly connected to the network.  Keep in mind that ransomware will target anything connected to an infected computer or network; unless the computer or network has been completely wiped clean of any trace of the malicious program, the ransomware will easily spread to any device connected, even after infection. Disconnect the backup drive after the backup and store it in a safe, secure and weatherproof location. I recommend that you keep at least two backup drives and rotate your backups between them.

2.    Update your software.  Keep your operating system and software up-to-date with all the latest patches, especially critical security patches. Better yet, allow or set up Windows to automatically update your PC with the latest patches.

3.    Maintain up-to-date anti-virus software, and ensure that virus updates are downloaded automatically. Check with your internet provider. They may supply a commercial security suite at no or little cost to you.

4.    Think before you click.  Do not click on unfamiliar links sent in unsolicited messages or e-mails: social media accounts can be hijacked, and e-mails can be spoofed, so even a trusted sender could really be a wolf in sheep’s clothing.

5.    Contact your local FBI field office immediately if you become the victim of a ransomware attack.  Avoid paying the ransom if at all possible.  According to the FBI, paying a ransom does not guarantee that you will regain access to your data; in a number of instances, individuals who paid the ransom were never provided with decryption keys.

And finally, more than anything, have a plan.  There are a number of resources on ransomware that contain useful considerations for both before and after a ransomware attack (6).  While there is no certain way to protect against ransomware attacks, preventative preparation has the potential to mitigate the impact.

 If you would like to review your current investment portfolio or discuss any other financial planning matters, please don’t hesitate to contact us or visit our website at We are a fee-only fiduciary financial planning firm that always puts your interests first.  If you are not a client yet, an initial consultation is complimentary and there is never any pressure or hidden sales pitch. We start with a specific assessment of your personal situation. There is no rush and no cookie-cutter approach. Each client is different, and so is your financial plan and investment objectives.

Sources and Foot Notes:
(1) US-CERT Alert TA16-091A, “Ransomware and Recent Variants”
(2) Enigma Software, “April 2016 was the Worst Month for Ransomware on Record in the US”
(3) Security Week, “The Internet’s Big Threat: Drive-by Attacks”
(4) Kaspersky Lab, “Kaspersky Lab on Business Threats: 2015 Saw the Number of Cryptolocker Attacks Double”
(5) FBI, “Incidents of Ransomware on the Rise”
(6) Department of Homeland Security United States Computer Emergency Readiness Team, “Ransomware”

References (24)

References allow you to track sources for this article, as well as articles that were written in response to this article.
  • Response
    One of my friend had suffered with this problem. He just clicks the link that was sent by the anonymous user and their email account was hijacked for the next minute. The posted tips really helpful for the people to aware of this Ransomeware and protect their social accounts from these ...
  • Response
    Response: qwe2
  • Response
    banner mistakes in html5 design
  • Response
    Buy ADSL Splitter Online In India at wholesale price at Shop online for 100% Authentic ADSL Splitter Box.
  • Response
  • Response
    Response: kom ihg
  • Response
    Response: man reng
  • Response
  • Response
    Response: ditt kontor
  • Response
    Response: 5fghsrt
  • Response
    Response: troll
  • Response
    Response: mounting gaps
  • Response
  • Response
  • Response
  • Response
  • Response
    Response: Essay Help Online
  • Response
    Response: Homework Site
  • Response
    Notwithstanding another pattern for "simplified" WEBSITE DESIGN MELBOURNE manufacturers, the most ideal approach to guarantee your website
  • Response
    Banquets in Gurgaon, Party Hall in Gurgaon, banquet halls in gurgaon, birthday party venues in gurgaon, wedding venues in gurgaon, corporate party venues in Gurgaon
  • Response
    essay generator
  • Response
    Response: iit jee app
    Neet study material, Neet study material app, neet study material apps, neet concepts, neet preparation app, neet video lectures, learning app for neet, neet apps, neet preparation apps, neet preparation app, neet, neet physics, physics for neet, chemistry for neet, neet chemistry, neet notes, neet app, neet test series, neet test ...
  • Response
    Response: epsxe for Android
  • Response

Reader Comments (1)

Ransomware is one of the harmful virus. Thanks for sharing the full information about Ransomware. But How do I secure a system from this virus? If I am using documents of MS OneNote Support On Cloud service so it will harm on the cloud also or not.

PostPost a New Comment

Enter your information below to add a new comment.

My response is on my own website »
Author Email (optional):
Author URL (optional):
Some HTML allowed: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <code> <em> <i> <strike> <strong>