Ransomware

Malware - short for malicious software - includes viruses, spyware, and other types of harmful software designed to cause disruption, gain unauthorised access to your device or obtain personal information.

Video: Learn more about different types of malware and computer viruses that you should protect yourself against.

Ransomware

Ransomware is one of the most devastating forms of malware. Malware is short for malicious software and includes viruses, spyware, and other types of harmful software designed to cause disruption, gain unauthorised access to your device, or obtain personal information.

  • Social engineering - Ransomware attacks come from cyber criminals using social engineering techniques to manipulate human emotions and trigger a response.
  • Demand a ransom - As the name suggests, scammers demand a ransom to get your device running again.
  • Fast spreading – A ransomware attack can spread fast across networks and through organisations, and encrypts all files on a system, leaving everything unusable.
  • Phishing - Ransomware is spread primarily through email phishing. Phishing is the most effective way of infiltrating an individual or company’s computer system.
  • Human error - Ransomware attacks rely on human error; for cyberattacks to succeed, someone, somewhere, needs to take the bait.

The good news is that you can protect data, devices, and systems at university and at home. Here are three simple, practical cybersecurity awareness tips you can use to identify and avoid malicious emails:

  1. Read emails closely – try to avoid skimming. Look for clues that may identify an email as a phishing attempt.
    • Check URLs and links by hovering your mouse over them
    • Check for spelling and grammar mistakes
    • Look for triggers – phishing emails are trying to get an emotional response
    • Be aware of unsolicited requests for money
  2. Stop and think – Once you have read the email, ask yourself these questions:
    • Was I expecting this message?
    • Does this email make sense?
    • Am I being pushed to act hastily or out of fear?
    • Does this seem too good to be true?
    • What if this is a phishing email?
  3. Verify – If the questions above raise doubts or further questions, take the following steps:
    • Don’t click - instead of clicking on a link, open your web browser, type in a known, trusted URL, and navigate to the site yourself.
    • Do your research - instead of replying to an email or calling a number included in the message, do your own fact-finding. Use an email address or phone number that you can confirm.
    • Contact - if you’ve received a questionable message from a colleague or friend, contact her or him via another channel (like a phone call or text message) to ensure she or he sent it.
    • Ask IT - reach out to your IT team for advice and alert them that there is a potential phishing threat on your organisation’s network.

Device Security

To learn more about how to keep your device secure, see our Device Security information and tips.

Up-to-Date Software

Updating software on university and personal devices can be an inconvenience, but it is critical to ensure the smooth running of your device as well as to provide security; here’s why:

  • Fix Vulnerabilities - software updates fix known vulnerabilities that allow malicious content through to you and your network
  • Improved performance - updates can improve computer performance or operating issues. Safely installing updates:
  • Trusted sources - install updates only from trusted sources – your browser’s security settings or directly from your computer application
  • Pop-Ups - beware of unexpected popup windows prompting you to run security updates
  • Don’t delay - don’t put off updates when they are available - run them as soon as possible
  • Ask IT – if you need help, ask the IT department

Antivirus

Malware and virus protection should be installed on all devices connecting to our university network. We recommend installing antivirus on any personal device you use at university, home, and public places, including airports, libraries, and cafes.

Apple Macs are no longer excluded and should have virus protection installed. Trojans and ransomware can now attack Mac computers.

Try the following options to remove malware from your own device.

  • Delete Temporary Files: Enter safe mode on your machine and remove any temporary files using Disk Cleanup. This should be performed before running any antivirus or malware scans.
  • Scan with Antivirus: Install antivirus software on your machine and run a full system check, including registry, removable drives, and system files). You may need to run the scan multiple times to remove the full infection.
  • Scan with Malware: Install malware software (Malwarebytes) on your machine. Run a full system scan (including registry, removable drives, and system files). You may need to run the scan multiple times to remove the full infection.
  • Reset browser settings: Reset your browser back to default settings. Remove cache, browser history, password, and forms. Clear all settings and then restart your machine. You will need to change your homepage to a new default search engine.
  • Check with Google: If you notice error messages or new search engines on your machine and web browser. You can google the message or name of the unknown application to confirm if it is malicious and how to remove it. The steps are specific to the issue you are experiencing.
  • Check Programs and Features: Check for unwanted applications under Programs and Features (Windows) or Applications (Mac). Remove any application that is not used or is unknown.
  • System Restore: A complete system restore may be required if you cannot remove all threats from your device. Complete a backup of your files to an external device. Scan the device for any threats before restoring it to a new machine.

Act quickly if you suspect your computer is infected; this helps to prevent the spread of malware and protect your personal information.

Report Malware to IT

Steps for removing malicious software from your device depend on the type of attack you are experiencing. Please contact the IT Service Desk if any university device shows signs of a malicious attack.

Please submit the following information for IT to determine the type of malware you may have on your device.

  • Type of laptop (single-use, shared)
  • When the signs started
  • What signs or issues are you experiencing
  • If you received any links in emails or from websites
  • If you are being asked for money or completely locked out of the device
  • Have you travelled anywhere recently?

Back to IT@ND: CyberSecurity