Proton
what is ransomware

Ransomware is one of the more common and dangerous forms of cybercrime, but what is ransomware exactly? In this article we’ll explain how it works, what you can do to prevent becoming the victim of a ransomware attack — and how to recover if you ever are.

What is ransomware?

Ransomware is a type of malware that infiltrates your device and encrypts your files, folders — or even the entire drive — so you can no longer access them. The only way to decrypt your data is to pay a ransom (usually in the form of cryptocurrency) to the attackers. It’s extortion, plain and simple: If you don’t pay, your files are locked away forever or even destroyed.

To give you an idea of how common — and serious — the problem of ransomware is, the American insurance company Corvus reports(новое окно) that ransomware attacks were up 95% in 2023 compared to 2022, and this number is expected to rise. According to Corvus, last year there were as many as 4,000 victims reported on dark web sites; there are likely thousands more. The number of victims over the past two decades, when ransomware first became mainstream, is almost impossible to calculate.

Well known ransomware attack examples include WannaCry and attacks by cybercriminal group LockBit, which have caused significant damage to businesses worldwide

How does ransomware work?

Ransomware is a kind of malicious software that infects your computer. There are different types of ransomware, but they often operate as a Trojan horse virus (usually just called a Trojan). Trojans are so named because they’re disguised as something else — a handy program, a useful PDF, or important spreadsheet — and once on your hard drive will reveal their true nature. 

Where many computer viruses exist to extract information or simply to cause havoc, a ransomware virus will instead encrypt either an entire hard drive or parts of it. When the victim tries to access the computer or the folder, they receive a message that the files are encrypted and that a sum must be paid to either a bank account or, more likely, a crypto wallet.

Once the victim transfers the money or cryptocurrency, the attacker then sends a password that should once again decrypt the drive or folders. However, in practice it often doesn’t happen this way, and many victims don’t receive a password for the ransomware removal upon payment. 

As a result, it’s best not to pay ransomware attackers. If they could be trusted to uphold their end of the bargain, it could be something you could risk, but that’s usually not the case. According to research done by Sophos(новое окно), roughly 50% of companies that paid up actually got their data back. The rest did not.

That’s not great odds to begin with, but there’s also the risk of establishing a reputation as someone who pays attackers. According to one study(новое окно), at least 80% of companies that paid were attacked again, often by the same group that targeted them the first time. As a result, it’s much better to prevent attacks instead, or at least make sure you can recover from them more easily.

How to protect against ransomware

Protecting and dealing with ransomware needs a two-pronged approach: On the one hand you need to make sure you don’t get infected, and on the other you must have systems in place to offer some form of ransomware protection in case you do.

How to prevent ransomware infection

There are many anti ransomware solutions and software that reduce the risk of attack, but, as methods are constantly evolving, there is still a chance that a more sophisticated actor can find a way to pass through your defenses — that’s why it is critical take additional precautions.

Implementing strong ransomware detection methods, for example, monitoring network traffic for unusual activity, is essential for early identification. But, one of the least technical and most effective ransomware solutions is making sure you don’t download strange files, especially from unknown sources, since ransomware is almost always a virus.

The biggest threat to be aware of is phishing, in which an attacker will contact you impersonating a person or institution you normally trust. The aim is usually to get you to give up personal information, or in the case of ransomware, get you to download the virus. Always verify whom you’re dealing with and never download files unless you know what they contain. That goes for unexpected emails, text messages, and websites. Fake sites are a popular way to distribute all kinds of malware, so confirm you’re on a legitimate site before downloading any files.

Backups and versioning

Of course, in any organization people make mistakes, and you can never rule out a successful ransomware attack. If a ransomware attack does pass your defenses, there is another option besides paying. You can ignore the attack, overwrite the hard drive, and then reinstall from an existing backup.

For this, you need a cloud storage service that can perform backups of vital files by syncing them. But the service needs to go one step further: The backups also need to create versions of files for every sync. This is because when attackers encrypt a file, that’s the version that gets uploaded to the cloud; with versioning, you can just roll back to an earlier version.

Proton Drive can do both these things. Through our syncing feature on both the Windows and macOS desktop app, you can sync any file or folder from your device. Any time you make a change to those files, a new version is created, which you can then recall through our version history feature. If you get hit with a ransomware attack, you just wipe the hard drive, restore your files, and get back to work, no ransom paid — a simple and stress-free method of ransomware recovery.

Defend yourself with Proton

Besides protecting files from ransomware, Proton Drive also keeps them safe from more direct attacks. For example, it uses end-to-end encryption, which prevents anybody but you from seeing what’s in your files. We also don’t have access to your passwords. Taken together, this means you and your business are at far less risk of a breach than with other cloud storage services that don’t use end-to-end encryption.

If better security, smarter backups, and improved

Статьи по теме

The cover image for a Proton Pass blog comparing SAML and OAuth as protocols for business protection
en
SAML and OAuth help your workers access your network securely, but what's the difference? Here's what you need to know.
Proton Lifetime Fundraiser 7th edition
en
  • Новости Proton
Learn how to join our 2024 Lifetime Account Charity Fundraiser, your chance to win our most exclusive plan and fight for a better internet.
The cover image for a Proton Pass blog about zero trust security showing a dial marked 'zero trust' turned all the way to the right
en
  • Для бизнеса
Cybersecurity for businesses is harder than ever: find out how zero trust security can prevent data breaches within your business.
How to protect your inbox from an email extractor
en
  • Советы о конфиденциальности
Learn how an email extractor works, why your email address is valuable, how to protect your inbox, and what to do if your email address is exposed.
How to whitelist an email address and keep important messages in your inbox
en
  • Советы о конфиденциальности
Find out what email whitelisting is, why it’s useful, how to whitelist email addresses on different platforms, and how Proton Mail can help.
The cover image for Proton blog about cyberthreats businesses will face in 2025, showing a webpage, a mask, and an error message hanging on a fishing hook
en
  • Для бизнеса
Thousands of businesses of all sizes were impacted by cybercrime in 2024. Here are the top cybersecurity threats we expect companies to face in 2025—and how Proton Pass can protect your business.