Ransomware FAQs

A knowledge base article about Ransomware FAQs provided by the UC Berkeley IT Service Hub - Knowledge Portal

How does a computer become infected with Ransomware?

Ransomware is often spread through phishing emails that contain malicious attachments or through drive-by downloading. Drive-by downloading occurs when a user unknowingly visits an infected website, and then malware is downloaded and installed without the user’s knowledge.

Crypto ransomware, a malware variant that encrypts files, is spread through similar methods and has also been spread through social media, such as Web-based instant messaging applications. Additionally, newer methods of ransomware infection have been observed. For example, vulnerable Web servers have been exploited as an entry point to gain access to an organization’s network.

What can I do to protect against Ransomware?

Infections can be devastating to an individual or organization, and recovery can be a difficult process that may require the services of a reputable data recovery specialist.

CISA has several recommendations for users and administrators to protect their computer networks from ransomware infection. Some of the most noteworthy include:

Individuals or organizations are discouraged from paying the ransom, as this does not guarantee files will be released, nor does it change reporting obligations.  Should you experience ransomware on a campus system, please notify the Information Security Office at security@berkeley.edu.

What is the possible impact of Ransomware?

Ransomware not only targets home users; businesses can also become infected with ransomware, leading to negative consequences, including

Paying the ransom does not guarantee the encrypted files will be released; it only guarantees that the malicious actors receive the victim’s money, and in some cases, their banking information. In addition, decrypting files does not mean the malware infection itself has been removed.