- Encrypting ransomware — The most common type of ransomware encrypts the victim's files so that they cannot be accessed without the decryption key. Attackers then demand a ransom payment in exchange for the key
- Locker ransomware — A type of ransomware locks victims out of their computer by changing the login credentials or displaying a message that prevents the victim from accessing their system. Attackers then demand a ransom payment to unlock the computer
- Ransomware-as-a-Service (RaaS) — A business model in which attackers offer ransomware to other individuals or groups who want to carry out attacks. The former will typically provide the ransomware and handle payments, while the latter receive a percentage of the ransom payments
- Scareware — Ransomware designed to scare victims into paying the ransom. It typically involves displaying fake security warnings or messages that claim the victim's computer is infected with a virus. The attacker will then demand a ransom payment to remove the supposed infection
- The attacker gains access to a victim's computer, either by sending a phishing email or by exploiting a vulnerability in the system
- Once the attacker has access to the victim's computer, they will install the ransomware on the system
- The ransomware will then encrypt the victim's files, making them inaccessible to the user
- The attacker will then demand a ransom from the victim, typically in the form of a digital currency like Bitcoin, in exchange for the decryption key that will unlock the encrypted files
- If the victim pays the ransom, the attacker will provide the decryption key and the victim will be able to access their files again. However, there is no guarantee that the attacker will actually provide the key, and even if they do, the victim's files may be damaged or corrupted as a result of the encryption process
- There is no guarantee that the attacker will actually provide the decryption key. In many cases, victims who pay the ransom never receive the key and remain unable to access their files
- Paying the ransom may encourage attackers to continue their campaign of attacks. If attackers know that victims are willing to pay the ransom, they may be more likely to carry out more attacks in the future
- Paying the ransom may make you a target for future attacks. If the attacker knows that you are willing to pay a ransom, you may be more likely to be targeted in the future
- Paying the ransom may be illegal. In some cases, paying a ransom to a criminal organization may be considered a form of funding terrorism or other illegal activities
- Your files are encrypted and you are unable to access them
- You receive a message from the attacker demanding a ransom payment in exchange for the decryption key
- You see unfamiliar programs or processes running on your computer
- Your computer becomes slow or unresponsive
- Your computer displays unusual error messages or pop-up windows
- Use reputable antivirus or security software and keep it up-to-date. This can help protect your computer from ransomware and other types of malware
- Be cautious when opening email attachments or links. Ransomware is often delivered through phishing emails, so it is important to be careful about what you click on
- Keep your operating system and other software up-to-date. Software updates often include security patches that can help protect your computer from ransomware and other threats
- Back up your files regularly. This can help protect your data if your computer is infected with ransomware. Make sure to adhere to one of the recommended backup strategies, such as the 3-2-1 backup strategy
- Be aware of the risks of ransomware and educate others in your organization about these threats. This can help prevent ransomware attacks and make it easier to detect and respond to them if they do occur
- Prevent access — Reduce the spread of ransomware by setting file, application, and access permissions, and configure secure login credentials using Secure SignIn and C2 Password
- Protect devices — Outdated systems are at greater risk. Update all your NAS at once with Synology Central Management System (CMS), and safeguard other devices using group policies in Synology Directory Server and C2 Identity
- Avoid suspicious files — Spam and phishing emails containing suspicious files are common methods of spreading ransomware. Synology MailPlus provides strong anti-malware protection and spam prevention
- Check for vulnerabilities — Use Synology Security Advisor to routinely scan for malware, vulnerabilities, and abnormal login activities. Implement recommended changes to improve your NAS security. Learn more