I just discovered that my files have been encrypted by ransomware.
- Can I get my files back? How?
- Should I pay the ransom?
- What should I do so that this never happens again?
I just discovered that my files have been encrypted by ransomware.
Can I get my files back? How?
Maybe.
If you have backups, you can restore your files from there. Just make sure to completely reinstall your operating system first, i.e. "nuke from orbit", to remove the malware first. If you don't do that, you will just get infected again.
If you don't have backups, things get trickier. Some ransomware has been beaten and its encryption can be reversed. Others have not. To find out if you are lucky, you can use a decryptor (e.g. The No More Ransom Project, Kaspersky's No Ransom). They offer a service that helps you identify what strain of ransomware you have, and let you know if there is a tool to decrypt your files.
If you are unlucky and your ransomware is not on the list, you can backup the encrypted files on an external drive (with nothing else on it, it might get infected, too) in the hope of a future cure. But there is a real risk that your files are just irreversibly gone.
Should I pay the ransom?
I wouldn't.
First of all, there is no guarantee that you will get your files back - there is no honor among thieves. Some forms of ransomware don't even bother to encrypt the files - it just replaces it with random junk to make it look encrypted. Obviously, paying in a situation like that does not help.
Second, you will be financing organized crime and creating incentives to create ransomware in the first place.
What should I do so that this never happens again?
Apart from general good computer hygiene (don't download strange stuff, keep things updated, etc.) there is one killer solution to the ransomware problem: Make frequent external backups.
The inclination here is to post an emphatic HELL NO, tell them where they can stick their malware, and bid them a good day. No payouts for you, Mr. Neer-do-well! The company I work for was hit by the original cryptolocker (circa 2013) and we were able to do just that thanks to a simple but effective use of Windows Backup.
Odds are, if you're here, you don't have one. Or you thought you did, but... well, stuff happened. I disagree with Anders' answer on this point
First of all, you probably won't get your files back
Now this can be true (there's always the one-off morons doing this just because they can), but most people doing this stuff want money. If there were a widespread reputation that people didn't get their files back far fewer people would pay up. There is, at least, a decent chance you can get your files back, but like any media failure, you have to ask yourself this question:
If so, don't pay up. Take your painful lesson, backup in the future and move on. Problem solved
For a decent chunk of the people out there, the answer is probably NO. Like, maybe you work for a city/state/federal government agency and all your digitized records are at stake.
I'd love to tell you there's a magic service that can unencrypt your files, but, alas, even those who sell such services often pay up
Storfer said he’s been told by the FBI that Proven Data’s staff used to rely on “canned responses” that gave clients two options for data recovery. The first was paying the ransom. The second option was to unlock the files using Proven Data’s technology. Unbeknownst to clients, Storfer said, the second option didn’t exist. If they chose it, Proven Data paid the ransom anyway.
The prospects are grim otherwise
[O]rganizations have limited options when it comes to fighting back. The most obvious route, if backups are available for affected systems, is to simply restore the affected files. But with embedded computing devices and some other systems, backups may not be an option. Organizations could also use security gateways to try to block Tor traffic to prevent some crypto-malware from obtaining encryption keys, but Schowenberg notes that Tor-blocking "is not a solution to all ransomware problems"—and it might become less of a solution as attackers choose less-detectable communications methods. In some cases, companies have been able to mount an active defense with the help of law enforcement or security researchers.
But this can be a slow and expensive process. one that is problematic when time-sensitive data is involved. So, for companies and organizations without the wherewithal to reboot and restore their systems, paying up may be the least of the possible evils—especially if they can just sweep it under the rug afterward.
Paying up can work
Three Alabama hospitals have paid a ransomware demand to the criminals who waged a crippling malware attack that's forcing the hospitals to turn away all but the most critical patients, the Tuscaloosa News reported.
Yes, it is. And it really REALLY stinks. Those are your options. You either have a backup, you walk away from the data, or you pay up and cross your fingers. The reason I even suggest it at all is the criminals have an incentive to ensure your files are returned. Just remember, that Anders was 100% correct when he also said this
there is no honor among thieves
Good luck. You're going to need it. And if you've never been hit, you'd best check your backups are working and restorable.
Most of the ransomware attacks directed at US computers originate from countries which used to make up the USSR, to include Russia. I personally got hit with one of these about 3 years ago. It locked all my files, and booted a wordpad note saying I'd been hacked, and auto-took me to several websites saying I'd been hacked and demanding ransom. They wanted several hundred dollars in bitcoin and had a handy "type questions here regarding bitcoin accounts" where someone would actually get on and chat to talk you through getting and sending bitcoin. Knowing that these hackers generally avoid russian-based computers (because Russia don't care if you hack someone else, just don't do crime there.) I decided on a desperate gambit. Instead of asking a bitcoin question I sent, "Your attack in interfering with the ongoing operations of the Russian Federal Security Service. You have 48 hours to return access to this machine or actions will be taken against you." Lo and behold, the next day my computer was unlocked! Mind you it wasn't a clean "erasure" of the virus, as whenever I start my computer I still get a popup of the notepad doc saying I've been hacked. Can't figure out how to ditch it. But haven't had another problem apart from that and all my files were unlocked.
So say you don't have a chatbox/don't want to try it. Will paying get your your stuff back? Yes. Should you? Depends. You're very likely to get your computer unlocked if you do, but how do you feel morally about being extorted by sleazebags? Every success just makes them more likely to keep on trying.