Chances are, whoever responds to your request will want you to have run a few tools to help identify which strain of ransomware hit your system before agreeing to help.
So please be patient and be kind, and remember that if someone decides to help you here they are likely doing so out of their own time and energy.
I imagine the modern version of this play might go something like… But please don’t just create an account here and cry for help.
Your best bet is to read the “pinned” notes at the top of that section and follow the instructions carefully.
See, the key objective of ransomware is a psychological one — to instill fear, uncertainty and dread in the victim — and to sow the conclusion in the victim’s mind that any solution for restoring full access to all his files involves paying up.
Indeed, paying the ransom is often the easiest, fastest and most complete way of reversing a security mistake, such as failing to patch, opening a random emailed document e.g., or clicking a link that showed up unbidden in instant message.
A decade ago, if a desktop computer got infected with malware the chief symptom probably was an intrusive browser toolbar of some kind.
Five years ago you were more likely to get whacked by a banking trojan that stole all your passwords and credit card numbers.
For desktop users, some of the biggest risks come from insecure browser plugins, as well as malicious Microsoft Office documents and “macros” sent via email and disguised as invoices or other seemingly important, time-sensitive documents.
Microsoft has macros turned off by default in most modern Office versions because they allow attackers to take advantage of resources on the target’s computer that could result in running code on the system.
So understand that responding affirmatively to an “Enable Macros?
” prompt in an Office document you received externally and were not expecting is extremely risky behavior.
Also, get rid of or hobble notoriously insecure, oft-targeted browser plugins that require frequent security updates — like Java and Flash.