{"id":4849,"date":"2015-05-21T02:40:32","date_gmt":"2015-05-21T06:40:32","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4849"},"modified":"2020-02-26T18:59:44","modified_gmt":"2020-02-26T14:59:44","slug":"ransomware-protection-video","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-protection-video\/4849\/","title":{"rendered":"How Kaspersky Internet Security protects from ransomware"},"content":{"rendered":"<p>Ransomware is a kind of malware that steals users\u2019 files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys for ransom \u2014 hence why this malicious programming is also referred to as cryptoware.<\/p>\n<p>This is a huge problem nowadays, with new examples of ransomware circulating on a regular basis. There\u2019s already a great number of them out there:\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/cryptolocker-is-bad-news\/\" target=\"_blank\" rel=\"noopener nofollow\">CryptoLocker<\/a>,\u00a0<a href=\"https:\/\/threatpost.com\/key-flaw-enables-recovery-of-files-encrypted-by-torrentlocker\/108210\" target=\"_blank\" rel=\"noopener nofollow\">TorrentLocker<\/a>,\u00a0<a href=\"https:\/\/threatpost.com\/prisonlocker-ransomware-emerges-from-criminal-forums\/103443\" target=\"_blank\" rel=\"noopener nofollow\">PrisonLocker<\/a>,\u00a0<a href=\"https:\/\/threatpost.com\/malvertising-campaign-on-yahoo-aol-triggers-cryptowall-infections\/108987\" target=\"_blank\" rel=\"noopener nofollow\">Cryptowall<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/coinvault-ransomware-removal-instruction\/\" target=\"_blank\" rel=\"noopener nofollow\">CoinVault<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/teslacrypt-ransomware-targets-gamers\/\" target=\"_blank\" rel=\"noopener nofollow\">TeslaCrypt<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/new-version-ctb-locker\/\" target=\"_blank\" rel=\"noopener nofollow\">CTB-Locker<\/a>\u00a0and so on and so forth.<\/p>\n<p>There\u2019s a good reason why this type of malware is so popular among cybercriminals: it is a very profitable business with\u00a0<a href=\"https:\/\/threatpost.com\/teslacrypt-ransomware-taking-a-toll-on-victims\/112867\" target=\"_blank\" rel=\"noopener nofollow\">a clear action plan and direct monetization<\/a>. Criminals simply infect a person\u2019s computer, block their files, contact them for ransom, and as long as the victim values their files, receive payment.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">TeslaCrypt <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> is beginning to take a toll on its victims \u2013 <a href=\"http:\/\/t.co\/WYVr6BnU7L\" target=\"_blank\" rel=\"noopener nofollow\">http:\/\/t.co\/WYVr6BnU7L<\/a> <a href=\"http:\/\/t.co\/iOMJX7wzTd\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/iOMJX7wzTd<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/600756670088675328?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">May 19, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Ransomware creators are constantly improving their products and implementing more and more evil techniques to escalate their profit. For example, modern ransomware hides its command servers in Tor, which makes it really hard for cyber-investigators to recover encryption keys.<\/p>\n<p>Criminals even offer customer support to help their victims make payments easily. Not to mention that extortionists work hard on \u2018distribution solutions\u2019 for their malware \u2014 spam and\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/how-to-avoid-phishing\/\" target=\"_blank\" rel=\"noopener nofollow\">phishing campaigns<\/a>,\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/simda-botnet-check\/\" target=\"_blank\" rel=\"noopener nofollow\">huge botnets<\/a>, etc.<\/p>\n<p>Simply put, ransomware is way too profitable to vanish. It is here to stay and we should learn how to live with it.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The best line of <a href=\"https:\/\/twitter.com\/hashtag\/defense?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#defense<\/a> against any <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#ransomware<\/a> is to have backed up your machines yesterday. <a href=\"https:\/\/t.co\/cpcBqX1Qy2\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/cpcBqX1Qy2<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/560984613708136448?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">January 30, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The most effective option for ransomware protection is to regularly back up\u00a0all of your important files. If you have nothing to lose, criminals can\u2019t force you to pay their ransom.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>How #KasperskyInternetSecurity protects from #ransomware<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2F3Av2&amp;text=How+%23KasperskyInternetSecurity+protects+from+%23ransomware\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p><a href=\"https:\/\/me.kaspersky.com\/en\/free-trials\/multi-device-security?redef=1&amp;reseller=me-en_SoMe-2015_pro_ona_smm__onl_b2c__lnk____kismd___\" target=\"_blank\" rel=\"noopener\">Kaspersky Internet Security<\/a>\u00a0offers another option that we refer to as \u2018real-time backup when you need it\u2019. The core idea is straightforward: if Kaspersky Internet Security\u00a0detects some strange modification of your files, it immediately creates fresh copies of these files to prevent them from being \u2018stolen\u2019. Then it examines the software that attempted to modify your files. If it is really suspicious, then our product blocks it.<\/p>\n<p>From a user\u2019s point of view it\u2019s quite simple, as you can see in this video:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" type=\"text\/html\" width=\"640\" height=\"390\" src=\"https:\/\/www.youtube.com\/embed\/iX9Ajl8j1Ls?version=3&amp;rel=1&amp;fs=1&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent\" frameborder=\"0\" allowfullscreen=\"true\"><\/iframe><\/span><\/p>\n<p>If you are already a Kaspersky product user, all you need to do is to make sure your\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/tip-of-the-week-cryptoware\/\" target=\"_blank\" rel=\"noopener nofollow\">Kaspersky Internet Security is properly configured<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware is a kind of malware that steals users\u2019 files and exacts a ransom from its victims. The most effective approach is to encrypt the files and offer decryption keys<\/p>\n","protected":false},"author":40,"featured_media":4850,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[7,1485,1486,9],"tags":[994,618,995,180,499,433],"class_list":{"0":"post-4849","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-products","8":"category-special-projects","9":"category-threats","10":"category-tips","11":"tag-coinvault","12":"tag-cryptolocker","13":"tag-ctb-locker","14":"tag-kaspersky-internet-security","15":"tag-products-2","16":"tag-ransomware"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/ransomware-protection-video\/4849\/"},{"hreflang":"ar","url":"https:\/\/me.kaspersky.com\/blog\/ransomware-protection-video\/3390\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/ransomware-protection-video\/5362\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/ransomware-protection-video\/6106\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/ransomware-protection-video\/6090\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/ransomware-protection-video\/10243\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/ransomware-protection-video\/8765\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/ransomware-protection-video\/4547\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/ransomware-protection-video\/7683\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/ransomware-protection-video\/10243\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/ransomware-protection-video\/8765\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/ransomware-protection-video\/8765\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/coinvault\/","name":"CoinVault"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4849"}],"version-history":[{"count":3,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4849\/revisions"}],"predecessor-version":[{"id":16002,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4849\/revisions\/16002"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4850"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}