Latest advice for schools on ransomware
Posted 19th December 2016
Ransomware is an aggressive form of computer virus that targets your server, encrypts files and then demands a ransom for their release.
The technology driving ransomware - such as the CryptoLocker - is increasingly advanced and difficult to detect. It often targets the human element, relying on tricking a user into interacting with an innocuous looking file or link. Even with regular training, it only takes a single momentary lapse in judgement from a user to result in an infection. Given the volume of sensitive data that schools hold relating to children and their very strong reliance on data, this represents a significant threat to safeguarding. Following on from our Top 10 tips to protect your school from computer viruses, below is further advice on safeguarding your school data.How can ransomware infections occur?
There are four main ways to be aware of:
- Spam and unsolicited email: An easy and popular way for ransomware to spread is via emails and unsolicited email attachments. The emails trick the user into opening it, or opening the attachments (usually by making the content appear enticing for the user).
- Infected removable drives: Malware can spread through removable drives (USB flash drives and external hard drives). It is usually created to automatically install on any machine that it is connected to. If a computer or any other type of device is connected to a network, the malware can spread through the network to other machines.
- Bundled with other software: Ransomware can be bundled together with other software applications that are downloaded and installed. The victim may think they are only downloading a certain legitimate application, not knowing that it is a Trojan horse designed to trick them into activating the malware on their device.
- Compromised webpages: Ransomware can take advantage of software vulnerabilities in order to infect a computer. When the victim visits a compromised or hacked website, the ransomware can utilise pop-ups or other malicious tactics that mimic online advertisements in order to engage with the victim. Sometimes not even a click is needed for the ransomware to covertly seize control of the computer.
Once it has targeted your server, the ransomware will seek and infect all onsite data storage, as depicted above.