How to Protect Your Phone from Ransomware

Most ransomware attacks target desktop computers, servers, and high-value storage networks — but in recent years, a growing number of attacks have targeted smartphones and other mobile devices. Below, we’ll look at a few examples of how mobile ransomware works....
April 8, 2022

How to Stop Locky Ransomware: Prevention, Decryption, and Recovery

Locky is the common name for a ransomware variant that first appeared in 2016. The first version of Locky was distributed by the Necurs botnet; subsequent versions have been introduced by Necurs and other distribution groups. Typically, the ransomware is...
March 9, 2022

Ransomware Attack Data Recovery: 4 Factors to Consider

Ransomware attacks continue to threaten businesses, local governments, and nonprofit organizations — and the trend is unlikely to change anytime soon. According to public records, more than 400 city and county governments have sustained ransomware attacks since 2014. Private...
February 23, 2022

Does All Ransomware Come From Russian Cybercriminal Groups?

At Datarecovery.com, we frequently work with businesses, healthcare organizations, and other enterprises that have fallen victim to ransomware. Many of these cases are recoverable — while many of the most well-known ransomware variants are well designed, some have design vulnerabilities...
July 13, 2021

Baltimore Stored Data On Local Hard Drives Before Ransomware Attack

On May 7, 2019, Baltimore suffered a crippling ransomware attack that limited access to services, including online bill payments and municipal employees’ emails. Now, the city is trying to figure out what went wrong, and an audit has turned up...
October 4, 2019

Quick Tips For Properly Responding To Ransomware Infections

You’ve probably heard about ransomware, but if you’ve never suffered an infection, it probably seems like a negligible threat. Unfortunately, that’s not the case. Ransomware attacks are fairly commonplace, with major attacks compromising data at large enterprises, hospitals, government...
October 2, 2019

Why Ransomware Criminals are Moving Away from Bitcoin

Bitcoin used to be the preferred payment method of cybercriminals. Last year, we reported that the hackers behind the WannaCry ransomware infected PCs worldwide, and demanded payment in the form of Bitcoin from their victims. Hackers asked for Bitcoin because...
June 29, 2018

SamSam Ransomware Infection And Decryption Services

SamSam ransomware (also known as Samas, SamSamCrypt, and MSIL) is a quickly evolving type of malware that targets hospitals, municipalities, and other large organizations. After installing malicious software through compromised servers, the hackers encrypt network files, making them unusable, and...
April 11, 2018

City of Atlanta Hit by SamSam Ransomware

A ransomware attack on the city of Atlanta on Mar. 22 has left officials scrambling to provide services to residents. Many critical services, like public-safety and wastewater treatment, have been unaffected. Meanwhile, other systems have ground to a halt or...
April 1, 2018

Only Half of Ransomware Payments Resulted in Decrypted Files

A report from a leading research firm found a startling statistic for 2017: only half of ransomware victims who paid a ransom were able to successfully decrypt their files. These findings and others in the report offer even more incentive...
March 21, 2018