Recently, The Boston Globe and other news media reported that a file server at the Tewksbury Police Department was infected with a strain of malware, which had encrypted all of the files stored on this server. These files were arrest and incident records. When someone tried to access these records, they found that the files could not be opened because they were corrupted. Then they found a document that explained that the files had been encrypted and gave instructions on how they could pay $500 to get the encryption key to recover their files.
After several days of trying to recover the files, with the aid of federal and state computer experts and 2 outside IT firms, they finally paid the $500, using an electronic form of payment called Bitcoin, and got the data back.
This sort of thing has been happening for a while now to all sorts of businesses and individuals—this got media attention because public money was used to pay the ransom, so it became public information. Payment forms like Bitcoin and MoneyPak are used because the payment is not traceable to the recipient.
Can it happen to you? Yes!
This malware is usually installed through an email attachment, often in an email supposedly from FedEx or UPS about a package being delivered. There is also evidence that it can be installed by a hacker getting into a server through a remote connection. Sometimes the encrypted data is recoverable through Windows, and sometimes with a 3rd party application. Usually, the malware turns off features like System Restore and Volume Shadow Copy so that these recovery methods are no longer available. I'm sure that the Tewksbury people tried everything.
Another scary thing—if the infected PC is connected to mapped network drives, such as on a file server, those files can be encrypted too. And if a backup drive is connected to the PC, doing automatic or periodic backups, the files on the backup drive will be overwritten with the encrypted versions, since the files have been changed to newer versions. Cloud-based backup services may save previous versions of backed up files—you should ask your backup service.
The best strategy against this issue seems to be keeping a periodic manual backup to a drive that is disconnected after the backup is completed. Frequency of the backups determines how much data is at risk. I can set this up for you, including providing the drive. I can come in to your business on a regular basis and run the backups too. Let me know if you need help.
Is your data protected?
The PC Handyman, 508 346-3502 firstname.lastname@example.org