{"id":4096,"date":"2014-10-03T10:00:21","date_gmt":"2014-10-03T14:00:21","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4096"},"modified":"2017-09-24T18:37:53","modified_gmt":"2017-09-24T14:37:53","slug":"tip-of-the-week-cryptoware","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/4096\/","title":{"rendered":"Tip of the week: How to protect yourself from cryptoware"},"content":{"rendered":"<p>We have written a lot about Cryptoware in the past. This is one of the fastest growing types of malware that targets end-users. These viruses are not created for hunting the \u201cBig Guys\u201d in governments and corporations, but for mass blackmailing of ordinary people. So how does it work in real life?<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102717\/50-2.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6204 size-full\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102717\/50-2.gif\" alt=\"50 (2)\" width=\"640\" height=\"480\"><\/a><\/p>\n<p>Just like this: \u201cDear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report which we have been preparing throughout the past two months\u2026 Oops\u2026 Just a moment, we are having some technical issues\u2026\u201d<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102716\/virus_en-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6202\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102716\/virus_en-1.png\" alt=\"virus_en (1)\" width=\"600\" height=\"466\"><\/a><\/p>\n<p>It seems as though the presentation has to be postponed because your computer has been attacked by a cryptovirus \u2014 a malicious program that blocks your access to some files on your computer and demands a ransom for their decryption. What a shame!<\/p>\n<p>Kaspersky Lab engineers recommend that you protect valuable files before your computer gets infected. Installing Kaspersky Internet Security and adjusting the settings will help protect you from the latest threats.<\/p>\n<ol>\n<li>Using the <strong>Application Control<\/strong> component, <a href=\"\/\/support.kaspersky.com\/11151\" target=\"_blank\" rel=\"noopener\">create a Protected file types category<\/a><strong>.<\/strong><\/li>\n<li>Configure rules on the access to the <strong>Protected file types<\/strong> category for <a href=\"\/\/support.kaspersky.com\/11151\" target=\"_blank\" rel=\"noopener\">High Restricted and Low Restricted<\/a> applications.<\/li>\n<li>Enable <strong>System Watcher<\/strong> in the application\u2019s settings:<\/li>\n<\/ol>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102715\/kis2015_en-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6201\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2014\/10\/05102715\/kis2015_en-1.png\" alt=\"kis2015_en (1)\" width=\"600\" height=\"451\"><\/a><\/p>\n<ol start=\"4\">\n<li>Configure the Firewall: <a href=\"http:\/\/support.kaspersky.com\/11154\" target=\"_blank\" rel=\"noopener\">block Internet access for Low Restricted, High Restricted, and Untrusted applications<\/a>. Using this method, you can prevent cryptoware programs from downloading the encryption key from the Internet. Without an encryption key, they will be unable to block access to your files.<\/li>\n<\/ol>\n<p>What do you do if your files are encrypted but Kaspersky Internet Security is not installed? Use our free utilities and regain access to your files:<\/p>\n<ul>\n<li><a href=\"\/\/support.kaspersky.com\/viruses\/disinfection\/10556\" target=\"_blank\" rel=\"noopener\">RakhniDecryptor<\/a><\/li>\n<li><a href=\"\/\/support.kaspersky.com\/viruses\/disinfection\/2911\" target=\"_blank\" rel=\"noopener\">XoristDecryptor<\/a><\/li>\n<li><a href=\"\/\/support.kaspersky.ru\/viruses\/disinfection\/4264\" target=\"_blank\" rel=\"noopener nofollow\">RectorDecryptor<\/a><\/li>\n<\/ul>\n<blockquote class=\"twitter-pullquote\"><p>If your files are encrypted but Kaspersky Internet Security is not installed, you can use our free utilities.<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F7TYe&amp;text=If+your+files+are+encrypted+but+Kaspersky+Internet+Security+is+not+installed%2C+you+can+use+our+free+utilities.\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>\u201dDear Chairman, dear Vice Chairman, dear members of the board, let me present to you the annual report\u2026 Oops\u2026 Just a moment, we are having some technical issues\u2026\u201d<\/p>\n","protected":false},"author":197,"featured_media":4097,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,9],"tags":[1062,261,180,192,502,131],"class_list":{"0":"post-4096","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-tips","9":"tag-antivirus","10":"tag-encryption","11":"tag-kaspersky-internet-security","12":"tag-protection","13":"tag-support","14":"tag-tips-2"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/4096\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/tip-of-the-week-cryptoware\/4185\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/4612\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/tip-of-the-week-cryptoware\/4847\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/tip-of-the-week-cryptoware\/5459\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/6199\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/tip-of-the-week-cryptoware\/5401\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/tip-of-the-week-cryptoware\/5459\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/tip-of-the-week-cryptoware\/6199\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/tip-of-the-week-cryptoware\/6199\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/antivirus\/","name":"Antivirus"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/197"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4096"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions"}],"predecessor-version":[{"id":6644,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4096\/revisions\/6644"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4097"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}