Ransomware

WannaCry Ransomware Demands Payment Before Data Encryption

Thieves are great at employing sophisticated techniques to steal data. One of the ways they do this is through WannaCry ransomware, where once a device is infected, you won’t have access to your files. Instead, you’ll receive a ransom, demanding payment. Once you make the payment, you are supposed to receive access to your files.

Of course, this isn’t a guarantee. Only half of the companies that decided to comply with the demands received their data back. This makes ransomware difficult to deal with, as it has the ability to cripple entire systems-see what happened to the city of Atlanta for example-and there are no assurances that even if you follow all the steps, you’ll have your data back. So, keeping up to date with the latest ransomware variants, how they work, and ways to prevent an attack are your best lines of defense.

Illustration by LifeLock

WannaCry Ransomware Demands Payment UpFront

A new wrinkle for the WannaCry ransomware is another fear-based tactic where hackers hope you make your decision rooted in emotion rather than in common sense. What happens is you’ll receive notification, normally in the form of an email with a variation of the following email message header, according to Sophos:

From: WannaCry Hack-team

To: ******

Subject: !!!Warning Wannacrypt!”

The message then goes on to say all of your devices were cracked with their WannaCry program installed on them, which means they can encrypt your data, rendering them inaccessible to you. They’ll even threaten to delete your files if you don’t comply with their demands.

In addition, it’s proactive in saying no antivirus program will be able to detect their program and firewall protections are useless against them. As you can see, it’s trying to build a compelling case as to why you should comply.

Then, the message gets to the heart of the matter. It states the deletion of your data will happen on a specific date and to avoid this data demolition, you should pay 0.1 BTC -the equivalent of $650- to the bitcoin wallet.

Illustration by Cyber Training 365

What Do I Do When Receiving This Warning?

First, it’s important to understand that while the message they sent could be containing some truth, this approach to get you to fork over money is fraudulent, according to Sophos. The reason for this, they say, is because the message isn’t backed by a malware delivery. Think about it: why would they give you a warning up front and time to do something about it?

Instead, it’s important to ensure you have all devices updated with the latest software, you have antimalware protection in place, and you communicate with your team or loved ones about the dangers of these types of ransomware variants.

Additionally, if you do become a victim of malware, having a restoration plan in place is integral. This is where the team at Salvage Data can help. We can restore your files securely and efficiently without fear of file deletion.

When you make us a partner, you receive quick access to file recovery and service to allay any fears you have. Contact us today to make us a part of your data restoration plan.

Share
Bogdan Glushko

CEO at SalvageData Recovery, Bogdan Glushko has over 18 years of experience in high-security data recovery. Over the years, he's been able to help restore data after logical errors, physical failures, or even ransomware attacks, for individuals, businesses, and government agencies alike.

Share
Published by
Bogdan Glushko

Recent Posts

Quickest Mobile Data Recovery Case: 100% of Data Recovered in One Hour

In a recent data recovery service case, the SalvageData recovery team achieved a remarkable feat…

2 months ago

How to fix a corrupted database on PS4 

A corrupted database on PS4 occurs when the system's organized data collection becomes damaged or…

2 months ago

How to Troubleshoot Black or Blank Screens in Windows

Encountering a black or blank screen on your Windows computer can be frustrating and alarming.…

2 months ago

LockBit Ransomware: A Comprehensive Guide to the Most Prolific Cyber Threat

LockBit ransomware has emerged as one of the most dangerous and prolific cyber threats in…

2 months ago

How To Use iPad Recovery Mode

Recovery mode is a crucial feature for troubleshooting and restoring an iPad when it encounters…

3 months ago

How to Prevent Overwriting Files: Best Practices

Whether you’re a professional juggling important work documents or an individual cherishing irreplaceable memories, safeguarding…

3 months ago