{"id":712,"date":"2022-03-16T13:12:06","date_gmt":"2022-03-16T12:12:06","guid":{"rendered":"https:\/\/www.susii.nrw\/what-happened\/ransomware\/"},"modified":"2022-04-22T10:56:43","modified_gmt":"2022-04-22T08:56:43","slug":"ransomware","status":"publish","type":"page","link":"https:\/\/www.susii.nrw\/en\/first-aid\/ransomware\/","title":{"rendered":"Ransomware"},"content":{"rendered":"\n<p class=\"has-text-align-center su-page-intro has-black-color has-text-color\">Ransomware and encryption Trojans infect computers and smartphones and encrypt all data. They also spread to external hard drives and further devices in the network and also target possible backups. The decryption of the data is only possible with special software which you will receive after payment of a ransom to the cyber criminals.<\/p>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-pan-tool su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7120\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Stay calm<\/h2><div id=\"ac-7120\" class=\"c-accordion__content\">\n<p>A Ransomware&nbsp;<strong>encrypts<\/strong>&nbsp;all data on your computer bit by bit. If you notice that such a process has started,&nbsp;<strong>immediately<\/strong>&nbsp;disconnect the network\/Wi-Fi connection and remove external hard drives and USB sticks. In this way you can potentially still prevent the malware from being distributed to further devices.&nbsp;<\/p>\n\n\n\n<p>Some Ransomware also threaten to publish your personal data, like photos or videos in the Internet, if a payment deadline is missed. However, so far, no case has become known in which such data is actually published.&nbsp;<\/p>\n\n\n\n<p>Other Ransomware simulate a police or federal police message stating in which illegal content such as child sexual abuse material has allegedly been found on your device. This does not apply either. The messages from the cyber criminals simply serve to make you pay the ransom.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-money-off su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7121\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Never pay a ransom!<\/h2><div id=\"ac-7121\" class=\"c-accordion__content\">\n<p>Under no circumstances should you pay a ransom to cyber criminals. This is a general recommendation from law enforcement agencies like the Federal Police, but also from all IT security experts.\u00a0<br>Companies should always report cases of Ransomware infection to the police, as this is a criminal act in the sense of\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.gesetze-im-internet.de\/stgb\/__253.html\" target=\"_blank\">\u00a7253 StGB<\/a>, German Criminal Code.\u00a0<\/p>\n\n\n\n<p><strong>Should you be blackmailed as a company:<\/strong><\/p>\n\n\n\n<p><strong>Landeskriminalamt NRW<\/strong><br>The NRW Landeskriminalamt&#8217;s Single Point of Contact for Cybercrime is available around the clock:&nbsp;<br>Single Point of Contact&nbsp;<br>Email: cybercrime.lka@polizei.nrw.de&nbsp;<br>Telephone: +49 211 939-4040&nbsp;<\/p>\n\n\n\n<p><strong>Cologne Public Prosecutor&#8217;s Office:<\/strong><br>ZAC NRW, which is headed by Senior Public Prosecutor Markus Hartmann, also investigates itself and performs some special functions within the judiciary in North Rhine-Westphalia&nbsp;<br>Email: zac@sta-koeln.nrw.de&nbsp;<br>Telephone: +49 221 477 4922 (24\/7-Hotline for enterprises and critical infrastructures).&nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Should you be blackmailed as a private individual:<\/strong><br>Competent specialized commissariats for Cologne:&nbsp;<br><strong>Computerkriminalit\u00e4t:<\/strong>&nbsp;Kriminalkommissariat 35, Telephone + 49 221 229 8355&nbsp;<br><strong>Allgemeiner Computerbetrug:<\/strong>&nbsp;Kriminalkommissariat 33, Telephone +49 221 229 8335&nbsp;<br><strong>Computerkriminalit\u00e4t Pr\u00e4vention:<\/strong>&nbsp;Kriminalkommissariat Pr\u00e4vention\/Opferschutz, Telephone +49 221 229 8655,&nbsp;<br><strong>Email:<\/strong>&nbsp;poststelle.koeln@polizei.nrw.de&nbsp;&nbsp;<br>The services are available weekdays between 07:30 &#8211; 16:00.&nbsp;<br>Alternatively, you can file an&nbsp;<a href=\"https:\/\/service.polizei.nrw.de\/anzeige\" target=\"_blank\" rel=\"noreferrer noopener\">criminal complaint online<\/a>&nbsp;with the police.&nbsp;<\/p>\n\n\n\n<p><strong>Never make direct contact with blackmailers without coordinating with the Landeskriminalamt.<\/strong><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-search su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7122\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Ascertain damage<\/h2><div id=\"ac-7122\" class=\"c-accordion__content\">\n<p>Check your entire network for further infections on other devices or systems, if necessary with the help of external experts.&nbsp;<\/p>\n\n\n\n<p>Initially, do not make any independent attempt to remove the malware. Only in this way is it possible for the police to secure evidence and initiate investigations.&nbsp;<\/p>\n\n\n\n<p>The police experts will give you further recommendations for action.&nbsp;<\/p>\n\n\n\n<p>In general, in the case of a large-scale infection in your company, you should additionally involve external experts.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-bug-report su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7123\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">How to remove Ransomware<\/h2><div id=\"ac-7123\" class=\"c-accordion__content\">\n<p>There are a number of Ransomware for which IT security experts have managed to develop a decryptor which will decrypt the data, but by no means for all.&nbsp;<\/p>\n\n\n\n<p>The\u00a0<a href=\"https:\/\/www.botfree.eu\/en\/ransomware\/gallery.html\" data-type=\"URL\" data-id=\"https:\/\/www.botfree.eu\/en\/ransomware\/gallery.html\" target=\"_blank\" rel=\"noreferrer noopener\">Ransomware Gallery<\/a>\u00a0on botfrei.de lists the available decryptors for particular varieties of Ransomware. They include instructions on how to remove the Ransomware. They include instructions on how to remove the Ransomware.\u00a0<\/p>\n\n\n\n<p>Another way of restoring your system is to restore your last &nbsp;<strong>backup<\/strong>&nbsp;&#8211; if this has not also been encrypted.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-computer su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7124\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Removal not possible<\/h2><div id=\"ac-7124\" class=\"c-accordion__content\">\n<p>Many variants of Ransomware use complex encryptions and are considered to be &#8220;uncrackable&#8221;. Every once in a while someone does manage to develop a decryptor that works. However, this can take months or even years.&nbsp;<\/p>\n\n\n\n<p>Users often only have the option of reinstalling their systems or restoring a back-up.&nbsp;<br>It is still a good idea to save and keep the encrypted files before reinstalling the system. If a decryptor does become available later, then they can be decrypted.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-search su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7125\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Discovering the cause<\/h2><div id=\"ac-7125\" class=\"c-accordion__content\">\n<p>In particular, the companies should research the source of infection when hit by ransomware, and check internal processes and security settings. This way any weak points can be dealt with for the future.&nbsp;<\/p>\n\n\n\n<p>Companies should not neglect training and awareness-raising for staff on IT security matters.&nbsp;<\/p>\n\n\n\n<p>Cyber criminals often look for the weakest link in companies, which mean this topic affects each and every member of staff.<\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js su-accordion su-icon-link su-box-shadow\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h2 id=\"at-7126\" class=\"c-accordion__title js-accordion-controller\" role=\"button\">Related links<\/h2><div id=\"ac-7126\" class=\"c-accordion__content\">\n<p>Botfree.eu:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.botfree.eu\/en\/ransomware\/gallery.html\" target=\"_blank\">Portal with a Ransomware Gallery<\/a><br>Botfrei-Forum:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/blog.botfrei.de\/forums\/\" target=\"_blank\">The Help Forum of the German Anti-Botnet Advisory Center<\/a><br>BSI for Citizens:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/Risiken\/Schadprogramme\/TrojanischePferde\/trojanischepferde_node.html\" target=\"_blank\">Information from the BSI on Ramsomware\u00a0<\/a><br>Heise.de:\u00a0<a rel=\"noreferrer noopener\" href=\"http:\/\/www.heise.de\/thema\/Ransomware\" target=\"_blank\">Thematic website on Ransomware at Heise<\/a><br>ID Ransomware:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/id-ransomware.malwarehunterteam.com\/\" target=\"_blank\">Alternative to Botfree&#8217;s Ransomware Gallery<\/a><br>nomoreransom.org:\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/www.nomoreransom.org\/\" target=\"_blank\">Help page run by Europol and international anti-virus companies AV companies<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware and encryption Trojans infect computers and smartphones and encrypt all data. They also spread to external hard drives and further devices in the network and also target possible backups. The decryption of the data is only possible with special software which you will receive after payment of a ransom&#8230;<a class=\"su-loop-button\" href=\"https:\/\/www.susii.nrw\/en\/first-aid\/ransomware\/\">Read More<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":704,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"footnotes":""},"_links":{"self":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/712"}],"collection":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/comments?post=712"}],"version-history":[{"count":2,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/712\/revisions"}],"predecessor-version":[{"id":809,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/712\/revisions\/809"}],"up":[{"embeddable":true,"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/pages\/704"}],"wp:attachment":[{"href":"https:\/\/www.susii.nrw\/en\/wp-json\/wp\/v2\/media?parent=712"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}