10 Things You Should Do After a Ransomware Attack – Microsoft 365 (2024)

Microsoft 365 Life Hacks > > 10 Things You Should Do After a Ransomware Attack

November 18, 2022

Having your computer infected with malware is a scary and frustrating experience. After all, there’s a big chance that your identity, credit card information, and other personal files could be stolen or lost forever. While plenty of types of malware can cause problems on your computer—ransomware can be the most aggravating.

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (1)

What are ransomware attacks? With ransomware attacks, bad guys download malware onto your computer or device and then demand you pay them ransom to get access to your device and important files. Hackers lock up your operating system, threatening to publish information, install another virus, or encrypt files. While it might seem like a small deal to pay the ransom and get on with your life, you can’t always trust that the person on the other end will hold up their side of the bargain.

All this can be stressful to say the least. So, here are 10 steps to take if you find yourself dealing with a ransomware attack.

  1. Stay calm. It’s natural for your first reaction to be anger or fear. You’re angry because somebody is trying to shake you down for your hard-earned money. Or maybe you’re scared because the hackers have threatened to reveal private or embarrassing information if you don’t pay. Fear is reasonable because you could lose valuable files, get your identity stolen, or have your information entirely compromised. However, it’s essential that you stay calm. You don’t want to do something irrational that could have negative long-term consequences for you or your device.
  2. Take a photo of the ransomware message. Remember that ransomware is a crime. In fact, hackers who distribute ransomware and extort less than $1,000 from their victims can still be charged with a felony. Before reporting an attack, it’s a good idea to take a picture of the ransomware message displayed on your device. You can do this with a smartphone, camera, or via screenshot, if possible. if possible.
10 Things You Should Do After a Ransomware Attack – Microsoft 365 (2)

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (3)

Microsoft Defender

Stay safer online with one easy-to-use app1

1Microsoft 365 Personal or Family subscription required; app available as separate download

Learn more

  1. Report the ransomware. The long and the short of it is that malware is illegal. Take time to report the ransomware to the proper authorities. Not only will you be protecting others from a breach like yours, but you’ll also be protecting yourself from future breaches.

“You can’t always trust that the person on the other end will hold up their side of the bargain.”

  1. Cut off incoming and outgoing connections. Nobody can access your computer remotely unless you’re connected to the internet. Disconnect from your Wi-Fi, unplug your ethernet cord, or do whatever else you need to do to disconnect your device from the web. If you’re not in a place where you can resolve the issue immediately, turn off the device to ensure malicious code doesn’t do further damage. Be sure to use Safe Mode when you restart your device, so you can access the basics of the operating system without allowing malware to do further damage. Cutting off your internet connection is the best way to quarantine your device.
  2. Disconnect external storage devices. Keeping backups of your files in the cloud or on an external storage device are good ways to protect anything you want to keep safe. The problem with many forms of malware is that they’ll also try to corrupt your external storage devices, so recovery efforts are futile. Quickly remove your external hard drive or thumb drives connected to your device to ensure it remains clean.
  3. Safely wipe the hard drive and reinstall your OS. With your items safely backed up, wiping your hard drive—while often a last resort—could be the best option when it comes to removing malware. You can reinstall your operating system and then move files from an external hard drive or the cloud back onto your device.
  4. Disable maintenance tasks. Many maintenance tasks on your device will continue to run as scheduled, regardless of a ransomware attack. Tasks like automatically emptying your Recycle Bin, cleaning out conversations, and deleting old files should be put on hold until the ransomware issue is resolved. Something could be deleted that you need to eliminate the malware or point authorities toward the source.
  5. Look for decryption tools in your antivirus software. Good antivirus software has a decryption tool of some sort to help resolve ransomware without meeting the hacker’s demands. Run through your antivirus software to look for decryption tools. If your software can’t help, search online on another device (a smartphone using cellular data is safe) to find a decryption tool.
  6. Identify the ransomware strain. Identifying the strain of ransomware can effectively identify the encryption code you need to unlock your device. Decryption websites can provide you with decryption codes, so you can resolve the issue without paying a ransom. The ransomware strain is also good to have when you go to the authorities to report the breach.
  7. Reset all of your passwords. A hacker who gains access to your computer also has access to any passwords you save in your web browser or operating system keychain. Once you’ve restored your operating system, go through and change as many passwords as you can. It’s also a good idea to make each of them unique from what you had when the breach occurred because a hacker who has a list of passwords will eventually be able to crack your new passwords.

Ransomware attacks are avoidable when you keep in mind a few ransomware prevention best practices. Doing things like avoiding questionable websites, not clicking links in emails from unknown sources, and even heavily scrutinizing emails from possibly reliable sources. Phishing scams are a common way hackers download ransomware to your computer, so it’s essential that you be cautious with links that come into your inbox or messaging app.

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (5)

Get started with Microsoft 365

It’s the Office you know, plus the tools to help you work better together, so you can get more done—anytime, anywhere.

Buy Now

Topics in this article

Tags

More articles like this one

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (6)

July 24, 2024

CEO fraud: What it is and how to identify it

Identify and stop a CEO fraud attack with these tips. Learn how this scam, sometimes known as whale fishing, is aimed at company executives and how to master CEO fraud detection.

Learn more

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (7)

June 27, 2024

What is cryptojacking?

Find out what cryptojacking is and how to recognize if your devices have been targeted.

Learn more

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (8)

June 27, 2024

What is a Smurf attack?

Prevent cyber attackers from targeting and overwhelming your computer. Learn what a Smurf attack is and how to prevent it.

Learn more

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (9)

June 27, 2024

How to spot bots on social media

Recognize questionable behavior on social media such as off-putting and automated messages. Learn why this behavior may be a sign of social media bots and other indicators.

Learn more

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (10)

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (11)

Everything you need to achieve more in less time

Get powerful productivity and security apps with Microsoft 365

Buy Now

Explore Other Categories

10 Things You Should Do After a Ransomware Attack – Microsoft 365 (2024)
Top Articles
How To Become a Multimillionaire
Social Security Number - California DMV
Average Jonas Wife
Danielle Moodie-Mills Net Worth
Mopaga Game
Caroline Cps.powerschool.com
Kristine Leahy Spouse
My.doculivery.com/Crowncork
Encore Atlanta Cheer Competition
Youtube Combe
Grand Park Baseball Tournaments
Florida (FL) Powerball - Winning Numbers & Results
Luciipurrrr_
Craigslist Pets Longview Tx
Calmspirits Clapper
Think Up Elar Level 5 Answer Key Pdf
سریال رویای شیرین جوانی قسمت 338
New Stores Coming To Canton Ohio 2022
Gdp E124
Committees Of Correspondence | Encyclopedia.com
Kp Nurse Scholars
Craigslist Sparta Nj
Nevermore: What Doesn't Kill
Titanic Soap2Day
Bethel Eportal
Dewalt vs Milwaukee: Comparing Top Power Tool Brands - EXTOL
Coomeet Premium Mod Apk For Pc
Rogue Lineage Uber Titles
How To Find Free Stuff On Craigslist San Diego | Tips, Popular Items, Safety Precautions | RoamBliss
Craig Woolard Net Worth
WRMJ.COM
Log in to your MyChart account
Inmate Search Disclaimer – Sheriff
Unm Hsc Zoom
Soiza Grass
Exploring The Whimsical World Of JellybeansBrains Only
CARLY Thank You Notes
Greater Keene Men's Softball
Mvnt Merchant Services
Fapello.clm
Anhedönia Last Name Origin
What Is A K 56 Pink Pill?
Oppenheimer Showtimes Near B&B Theatres Liberty Cinema 12
3 Zodiac Signs Whose Wishes Come True After The Pisces Moon On September 16
Smite Builds Season 9
Denise Monello Obituary
2000 Ford F-150 for sale - Scottsdale, AZ - craigslist
Myapps Tesla Ultipro Sign In
8663831604
Craigs List Sarasota
Intuitive Astrology with Molly McCord
Latest Posts
Article information

Author: Prof. An Powlowski

Last Updated:

Views: 6819

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Prof. An Powlowski

Birthday: 1992-09-29

Address: Apt. 994 8891 Orval Hill, Brittnyburgh, AZ 41023-0398

Phone: +26417467956738

Job: District Marketing Strategist

Hobby: Embroidery, Bodybuilding, Motor sports, Amateur radio, Wood carving, Whittling, Air sports

Introduction: My name is Prof. An Powlowski, I am a charming, helpful, attractive, good, graceful, thoughtful, vast person who loves writing and wants to share my knowledge and understanding with you.