Home » It’s the biggest ransomware attack in history. Are you protected?

It’s the biggest ransomware attack in history. Are you protected?

by Kurt Knutsson

The shear size and scope of victims now realizing they are being held hostage by ransomware attacker REvil is mind boggling. This is that moment that American and western businesses thought they were protected but missed the most basic security barrier allowing a systemwide compromise.

Now the infamous criminal ransomware enterprise known as REvil is demanding $70 million after claiming they’ve hacked and infected 40,000 computers. Cybersecurity firm that was used in the ongoing attack says the number of victims is closer to 1,500 total.

We’re not stupid. Ransomware hackers just got smarter.

Today’s ransomware hackers are amongst the most convincing criminals we have ever encountered.  Our mistaken mindset is one of the biggest weaknesses. “It can’t happen to me?” and “I don’t fall for scams” no longer apply.

Hackers are more gifted at disrupting lives and manipulating people just like you and me through more convincing techniques that include investments in AI software to identify you as their next target. Their criminal scam is so well thought out before an attack that they have mastered the act of turning us into fools.

 

How ransomware hackers are tricking us

Knowing how some of the latest ransomware scams work will help you avoid falling victim. We’re learning everyday the techniques that are more and more intimate, making us think we should interact to a malicious text, email and social media post.

 

 

Learn to Spot These Malicious Emails

  • When you look closely at the sender’s email address, it’s not exactly correct.

What Hackers Can Learn From Your Social Media Profile

  • Something about the tone is slightly off. At first glance it may seem right, but take a beat longer with a skeptical eye, and you see something not as expected.
  • Hover over a link or email address without clicking to see if it looks off. Such as added characters or numbers.
  • Links in the email may show a misspelled or strange web address. Such as “TrustedSiteName-02920423.com”
  • Most companies do not ever send email asking for credentials.
  • When you encounter a call-to-action link or button, let that raise a red flag. It means someone could be phishing for personal information to compromise your security.
  • If you should ever get an email like this, never click on any links. If you want to double check, again, don’t click on any links in the email but instead, open up a new browser and type in the company web address and log into your account. If the email you just received is true, the information should be reflected in your account. Odds are, the email you just received is malicious and you should mark it as “junk” or delete it.

 

What to Do If You Think You May Have Clicked on a Malicious Link

Use trusted anti-virus security software or apps to scan your device for a previous attack. Malware can be placed on your device unknowingly.  Hackers spend day and night thinking of ways to trick you.

If these criminals weren’t succeeding, I would not be sharing these important links below to some of the most powerful tools to use for detecting malware.

 

Best Anti-Virus Software and Apps to Protect Against Malware

One of the top anti-virus apps for both Androids and iPhones is TotalAV.   Their product is full of features to keep you safe from malware and protect you when browsing the internet including ransomware protection, real-time antivirus protection, elimination of viruses and malware, a tool to free up your computer’s space, plus more.   Limited time deal for CyberGuy readers: $19 your first year (80% off)   TotalAV antivirus software You can check out our review of other anti-virus apps, here: Best Antivirus Security Software and Apps to Protect You 2022.

No matter what protection you decide to use, awareness is half the battle. Keep second and third guessing every suspicious sense you feel in your gut when engaged in technology, reading email and texts.

Share this with anyone who may find this helpful by clicking the share button at the top of this article.

 

More ways to take back your privacy:



Print Friendly, PDF & Email

Related Articles

Leave a Comment

GET MY FREE CYBERGUY REPORT
Subscribe to receive my latest Tech news, tips & tricks, and deals newsletter. (We won't spam or share your email with anyone else.)

By signing up, you agree to our Terms of Service and Privacy Policy. You may unsubscribe at any time.