Great content delivered right to your mailbox

Thank you! Check your inbox for our monthly recap!

In a previous article we explained how the Active Protection feature in Acronis Online Backup stops a ransomware attack. Because the malicious process is rolled back immediately, your users suffer no downtime and will continue to work without even noticing what happened. But you can’t understand how innovative Online Backup Active Protection is if you don’t compare it to the usual process of recovering from a ransomware attack. In this article, we’ll show you the steps to follow to recover from a ransomware attack when you don’t have Online Backup Active Protection.

 

1. Disconnect the infected device from any and all networks right away

When ransomware strikes, this is the first step to take and it’s also the most critical one. To avoid other computers from being infected through the network, make sure the infected PC or device is totally disconnected. No LAN, no Wi-Fi, no Bluetooth, no GPS. This is also relevant when the infected user is working remotely from a public or home network.

 

2. Unplug any USB, SD or external drive

You may still have a chance to save data on external drives from being infected, so the earlier you disconnect them, the better. Put the USB, SD or external drive away, but do not connect it to another computer right away.

 

3. Collect information from the user

Most users will be scared and probably feel guilty about what just happened on their computer. Make them feel comfortable when asking questions about what just happened. Let them know every detail is precious and can save the whole company.

 

4. Inform other users

Act fast! If the infection started with a phishing email, other users in the company might have received the same type of message. So, it’s important to immediately remind all your users to remain alert. Inform them by all possible means and make them aware of how they could be infected.

 

5. Investigate the infected computer and recover files

If the ransomware has not totally locked the user out of the computer, you can further your investigations to identify the name of the ransomware.

  1. Because you never know how many malicious programs have been deployed on the computer with the attack and how many could be still dormant, execute a complete scan with your security tools. Again, do this on the isolated computer and do not reconnect it to the network.
  2. Uninstall any suspicious applications you might in the programs list, especially if it was installed at the time of the attack or a few hours before.
  3. Websites like NoMoreRansom.org now provide decryption tools that can help you recover files encrypted by a ransomware. Download them from another computer and copy them to a dedicated USB, then install the decryption tools on the isolated infected computer. If you’re able to recover the files, copy them to another external storage.
  4. Unless you feel comfortable following the previous steps, the wisest option is to proceed with a re-installation and a restore of the system and data files from a backup. The files recovered with the decryption tools would be copied back to the reinstalled computer.

 

Defend against ransomware with Acronis Online Backup

Recovering from a ransomware attack without paying cybercriminals is only possible with a proper backup and disaster recovery solution like Acronis Online Backup. The Active Protection feature makes it possible to halt a ransomware attack immediately, which your usual security tools will not do. When you don’t have Online Backup Active Protection enabled, you’re able to recover data, but the process can take hours. If you have several PCs infected, this can have a serious impact on your productivity and consequently, on your revenue.

Looking for expert support when it comes to building your cybersecurity stack? Become a Sherweb partner today to take advantage of leading cloud products and solutions, channel-specific expertise and sales and marketing assistance to help your managed services business reach its full cloud potential.

Written by The Sherweb Team Collaborators @ Sherweb