If you haven’t heard much about ransomware and malicious viruses lately, well, you may not be paying close enough attention. In November, a county government in Indiana paid $21,000 to cybercriminals after its systems were infected by a version of the Crypto virus that’s plagued the Internet for years. In February, a Hollywood hospital forked over $17,000 in Bitcoins to regain control of its data. And just last week, a sheriff’s office in Arkansas coughed up $2,400 to unlock the systems encrypted by hackers.
Even more terrifying is a recent ransomware variant called Popcorn Time that uses a shocking new pyramid scheme-style system to increase infections: the software transforms victims into attackers by offering them a way to bypass paying ransom — if they willingly pass on the malicious link to their contacts and two or more of them install it and infect their own computers.
Reports have begun surfacing about a similarly nefarious virus delivered via fake DocuSign email requests. Users who click on the link assuming it’s a legitimate document they need to sign will have their email accounts immediately infected, with the virus then scanning every single contact in Microsoft Outlook to deliver the same infected email. Like Popcorn Time, the new DocuSign request looks like it’s coming from the infected user’s real account, tricking contacts into clicking on it and becoming infected themselves.
The virus then deletes those contacts and creates an Outlook rule to send all incoming emails to trash so that the infected sender will remain unaware that they have a problem. As of this week, common anti-virus programs have missed these fake DocuSign requests, and without a reliable data backup solution in place, the deleted contacts and calendars are not recoverable from within Microsoft Outlook.
Feeling frustrated about the widespread scourge of ransomware, malware, and computer viruses is justified. But it’s also smart to direct some of that energy toward proactive protection of your technology and critical business information.
Most email programs let you preview a link by hovering over it with your cursor. If the domain name that appears has no connection to the sender of the email (say, something other than DocuSign.com in that DocuSign email request) or it shows up as an incomprehensible list of letters and numbers, it’s probably not safe to click. Any legitimate email from an organization will redirect you to a link with that company’s actual domain name in the URL address.
Hackers use a variety of delivery methods for malware and ransomware: PDFs, ZIP files, audio files that look like they’re voicemail messages, shipping or banking notifications… The bottom line is, if you aren’t expecting a specific attachment from a specific sender, NEVER open any file that arrives with an email you aren’t sure about.
If you do get infected by ransomware, there are only two ways to regain access to your data: 1) by paying a ransom to a shadowy cybercriminal or 2) by retrieving your backed up information, wiping your infected system clean, and starting fresh with the critical data that was (hopefully) backed up that very same day.
Computer Medic On Call is committed to bringing you the highest quality computer service available for all of your information and systems needs. Serving in Broward and West Palm Beach in Florida State for IT Support. Our experience provides us with the skills to offer a range of high quality computer services.
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
|cookielawinfo-checbox-analytics||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".|
|cookielawinfo-checbox-functional||11 months||The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".|
|cookielawinfo-checbox-others||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.|
|cookielawinfo-checkbox-necessary||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".|
|cookielawinfo-checkbox-performance||11 months||This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".|
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.