It's hard
Table of contents:
It is being the question these days. The alarm generated by Wanna Decryptor among users is significant, and this despite the fact that it is a _malware_ whose main objective is large companies, corporations and institutions in whose networks can be more easily introduced and distributed, causing further damage due to the sensitive information that may be contained in your files.
This, however, does not imply that individual users cannot end up being infected It is not very possible but... there is no absolute certainty that otherwise.For this reason, it is important to be more or less clear about the steps to follow if we come across the dreaded warning on the screen that Movistar employees have already seen.
But before continuing, some tips to keep in mind and above all have common sense when accessing depending on what content :
- Have our equipment updated or not use old versions of Windows.
- or open suspicious links (this is now and always)
- Have an antivirus and have Windows Defender activated
- Check regularly for pending updates
- Have our antivirus database updated
- Always have a backup copy of your files
And once, if with these steps, we have fallen into the hands of Wanna Decryptor or similar the first thing we should do is that we have seen being recommended in the news.Disconnect our equipment from the network (Wi-Fi or cable) to prevent the spread of _malware_ because the damage has already been done on our equipment. We must also disconnect any removable storage media that we are using.
This Is What You'll Never Want To See On Your ScreenOnce isolated, it's time to get down to work and you have to get an updated antivirus capable of stopping the bleeding The problem is that we don't have access to the network from our computer (remember that we have disconnected it?) so we will have to use another computer.
Get an antivirus on CD or DVD
We will have to get hold of a version of an antivirus but on Live CD/DVD since we cannot insert any kind of external drive and the system may not respond. We overcome these limitations in this way, since a Live CD is an operating system or a program stored on removable media, traditionally such as a CD or DVD, and that can be run directly on the computer.
We can opt for different brands, Norton, Avira, Kaspersky... and with options such as Norton Bootable Recovery Tool or Kaspersky Rescue Disk 10. We must record the program on the CD or DVD that we are going to use and load it on the infected PC to boot from it. In the case of not being able to use a CD or DVD because the infected computer does not have a reader we can use a USB memory but be careful, it is clean and has not been used on the sick computer.
We start the computer from the Live CD to carry out a system analysis and if it asks us to update the antivirus database we return to connect our equipment to the network with Ethernet cable. The analysis then begins, which may take a longer or shorter time depending on the amount of information stored.
If you achieve your goal, at the end we will see a notice to start the PC again. We start it again as if nothing had happened, although we may encounter cases in which we have to restore some files that could not be recovered (hence the importance of from a backup). Likewise, it is convenient that you analyze all removable drives that may have been in contact with the _malware_. If the infection has been corrected, the first thing you should do is check if you have a pending security patch and, if necessary, update your operating system.
And as a last piece of advice, keep calm. Do not panic and never, under any circumstances, provide a payment method to cyber attackers (bank account, credit card).Even if you do not see yourself capable of dealing with the problem, consult a knowledgeable friend or professional to help you. As you can see, these are very simple steps that we hope you don't have to take at any time.
In Xataka Windows | Windows XP receives a security patch again but only occasionally to block Wanna Decryptor