{"id":33472,"date":"2024-04-24T11:12:58","date_gmt":"2024-04-24T09:12:58","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/private-customers\/first-aid-against-ransomware\/"},"modified":"2024-12-05T09:42:23","modified_gmt":"2024-12-05T08:42:23","slug":"first-aid-against-ransomware","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/","title":{"rendered":"First aid against ransomware"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-810ad1ce854c84e404d415892b37fc36 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-42449531722d4e894e6d7744cb53802e\">\n.flex_cell.av-junyesco-42449531722d4e894e6d7744cb53802e{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/ransomware-1080.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-42449531722d4e894e6d7744cb53802e{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-42449531722d4e894e6d7744cb53802e av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8\">\n#top .av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-ko8kqdu0-5a0cf7a0054fa66616142053b02659e8 av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size av-linked-heading'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >First aid against ransomware<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3\">\n#top .av_textblock_section.av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jyzx0kqa-8b0988d736add2861771c640b9d40cd3 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"avia-testimonial-meta-mini\">\n<h3>Measures and prevention against ransomware and other malware<\/h3>\n<p>What should you do if you encounter a suspicious file on your computer, observe unusual activities, or even receive a ransom demand? The correct response can help prevent the spread of malware attacks and minimize damage.<\/p>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div><\/div><div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6\">\n.flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-5b165b798071c88cf1c9b8f11bd841b6 av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div><\/div><div id='av-layout-grid-3'  class='av-layout-grid-container av-29gj58u-428a7fa7dd62949d099c4a68345b6a86 entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5erh3i-231cf4149e3ad0666208546ae05143a4\">\n.flex_cell.av-5erh3i-231cf4149e3ad0666208546ae05143a4{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-5erh3i-231cf4149e3ad0666208546ae05143a4{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-5erh3i-231cf4149e3ad0666208546ae05143a4 av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-3sk2w9a-34201b0948d7cb26525e0242e7bed79e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>1. <strong>Stay calm.<\/strong><\/h3>\n<ul>\n<li>For the time being, ignore the attacker: Refrain from making contact until you understand your options or it&#8217;s absolutely necessary.<\/li>\n<li>NEVER take countermeasures without sufficient expertise! Avoid rushing into actions, as it may complicate later assistance.<\/li>\n<li>Organize an emergency team or seek help to assess the current situation accurately and devise a plan for countermeasures.<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lfqo3p8c-45b25e6f1a4a9b1b81fd3ae843f48538\">\n.flex_cell.av-lfqo3p8c-45b25e6f1a4a9b1b81fd3ae843f48538{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-lfqo3p8c-45b25e6f1a4a9b1b81fd3ae843f48538{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lfqo3p8c-45b25e6f1a4a9b1b81fd3ae843f48538 av-gridrow-cell av_one_half no_margin  avia-builder-el-11  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-11gw99q-2b39c69a95554cb81242861be7a391b7 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>2. <strong>Assess the current situation.<\/strong><\/h3>\n<p>Obtain a valid overview of the immediate impacts to derive and address further measures.<\/p>\n<ul>\n<li>Which systems within your organization\/network are affected?<\/li>\n<li>Which ransomware variant was used against you? [<a href=\"https:\/\/www.nomoreransom.org\/crypto-sheriff.php\">https:\/\/www.nomoreransom.org\/crypto-sheriff.php<\/a>]<\/li>\n<li>What kind of disruptions should you anticipate?<\/li>\n<li>Whom do you need to inform about your situation, when, and how?<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<\/div><\/p>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-3et7e8e-50b39ab49da2d33d75fa19fd06cb0a85 entry-content-wrapper main_color av-flex-cells  avia-builder-el-13  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lgdhh29d-e150841b88b2831c1bce21f9af854973\">\n.flex_cell.av-lgdhh29d-e150841b88b2831c1bce21f9af854973{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-lgdhh29d-e150841b88b2831c1bce21f9af854973{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lgdhh29d-e150841b88b2831c1bce21f9af854973 av-gridrow-cell av_one_half no_margin  avia-builder-el-14  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhkgmk-50a07a450c979241603d4acf743afdbb '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>3. Raise awareness.<\/h3>\n<p>Be aware that\u2026<\/p>\n<ul>\n<li>Your IT infrastructure has been compromised.<\/li>\n<li>The attacker may be monitoring\/reading your actions and measures.<\/li>\n<li>The attacker has likely been active in your networks for days or weeks, with a good understanding of your networks, infrastructures, and data.<\/li>\n<li>Data may have been stolen.<\/li>\n<li>The extortionist typically rents infrastructures. That means it&#8217;s not the specific ransomware or service provider attacking you \u2014 ANYONE can use these tools!<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-lgdhgtxd-2bef19ee15f5ae267fcbe84c75d3733f\">\n.flex_cell.av-lgdhgtxd-2bef19ee15f5ae267fcbe84c75d3733f{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-lgdhgtxd-2bef19ee15f5ae267fcbe84c75d3733f{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-lgdhgtxd-2bef19ee15f5ae267fcbe84c75d3733f av-gridrow-cell av_one_half no_margin  avia-builder-el-16  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhmh1a-eded627a0bce3b064ccf56326453256c '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>4. Separate infected systems.<\/h3>\n<ul>\n<li>Identify areas of your network that have not been infected yet.<\/li>\n<li>Isolate infected areas as quickly as possible to prevent further spread.<\/li>\n<li>Consider external data connections such as hard drives, cloud connections, or other interfaces.<\/li>\n<\/ul>\n<p>Note that machines without a &#8220;ransom note&#8221; appearing can still be compromised.<\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-2tnnucu-6982aadb95dbcf5d9dac08ecc86bbc90 entry-content-wrapper main_color av-flex-cells  avia-builder-el-18  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-8it95a-dcbc8e238bb9bd08b4981d3255bebeb5\">\n.flex_cell.av-8it95a-dcbc8e238bb9bd08b4981d3255bebeb5{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-8it95a-dcbc8e238bb9bd08b4981d3255bebeb5{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-8it95a-dcbc8e238bb9bd08b4981d3255bebeb5 av-gridrow-cell av_one_half no_margin  avia-builder-el-19  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhpjj5-f569a9b4a50b4b0507de1d4cdcb153f8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>5. <strong>Remove ransomware.<\/strong><\/h3>\n<ul>\n<li>Restart your computer in Safe Mode by repeatedly pressing the F8 key during startup until the &#8220;Advanced Boot Options&#8221; menu appears. Select Safe Mode with Networking to prevent the malware from automatically starting up with the computer.<\/li>\n<li>Scan your system thoroughly with a trusted and up-to-date anti-malware software to detect malware. Remove identified threats or seek assistance from experts if needed.<\/li>\n<li>Check your system files: Some malware can damage or delete system files. Open Command Prompt as an administrator and enter the command &#8220;sfc \/scannow&#8221; to scan your system files and repair any found issues.<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-20mntda-ecdf026c1fdc03f8566495cdaaae7606\">\n.flex_cell.av-20mntda-ecdf026c1fdc03f8566495cdaaae7606{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-20mntda-ecdf026c1fdc03f8566495cdaaae7606{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-20mntda-ecdf026c1fdc03f8566495cdaaae7606 av-gridrow-cell av_one_half no_margin  avia-builder-el-21  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhrexq-0b6b2f54592b6e1842c47f68ea34ee9b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>6. Close security gaps.<\/h3>\n<ul>\n<li>Identify the entry point through which attackers gained access to your systems, possibly with the help of forensic experts.<\/li>\n<li>Determine where and how the attackers established themselves. This knowledge is essential for restoring your system integrity.<\/li>\n<li>Ensure that all your software, including your operating system and web browser, is up to date with the latest security patches installed. This will help prevent future malware infections.<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-1o5kjri-1f65eaa41bbf4fde1869e01c2566de3b entry-content-wrapper main_color av-flex-cells  avia-builder-el-23  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-10y2yjy-733edd737741cc760117f8bfd0585285\">\n.flex_cell.av-10y2yjy-733edd737741cc760117f8bfd0585285{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-10y2yjy-733edd737741cc760117f8bfd0585285{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-10y2yjy-733edd737741cc760117f8bfd0585285 av-gridrow-cell av_one_half no_margin  avia-builder-el-24  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhu86h-a17d80f4a225c4fb94c93992a998302b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>7. Verify backups.<\/h3>\n<ul>\n<li>Before attempting to restore or remove files, create a backup copy of the encrypted files to avoid further damage or loss.<\/li>\n<li>Ensure that you only restore files from backups that were not infected with the ransomware and that the malware has been completely removed from your network.<\/li>\n<li>If it is no longer possible to reconstruct your encrypted data from backups, consider which data you absolutely need and whether you can retrieve it from other sources\u2014such as customers or systems that were not connected to the network at the time of the attack (laptops, older servers, etc.).<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kwg7fy-dad48575831e02f394171ce77e918b5e\">\n.flex_cell.av-kwg7fy-dad48575831e02f394171ce77e918b5e{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-kwg7fy-dad48575831e02f394171ce77e918b5e{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-kwg7fy-dad48575831e02f394171ce77e918b5e av-gridrow-cell av_one_half no_margin  avia-builder-el-26  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-lgdhwabk-8af0fe4dac4eaa61ce06dc62f7b1b41d '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>8. Report the incident and file a complaint.<\/h3>\n<ul>\n<li>Follow legal requirements for reporting the incident and informing affected individuals.<\/li>\n<li>For particularly critical or sensitive data, it&#8217;s best to contact your partners or customers by phone.<\/li>\n<li>Inform your employees about the incident and what information they can or should disclose to third parties.<\/li>\n<li>Also, file a complaint with your nearest police station.<\/li>\n<\/ul>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-33472","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>First aid against ransomware - IKARUS Security<\/title>\n<meta name=\"description\" content=\"First aid against ransomware attacks: What to do as soon as possible and what you&#039;re better off avoiding to minimize the damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"First aid against ransomware - IKARUS Security\" \/>\n<meta property=\"og:description\" content=\"First aid against ransomware attacks: What to do as soon as possible and what you&#039;re better off avoiding to minimize the damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-05T08:42:23+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/first-aid-against-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/first-aid-against-ransomware\\\/\",\"name\":\"First aid against ransomware - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"datePublished\":\"2024-04-24T09:12:58+00:00\",\"dateModified\":\"2024-12-05T08:42:23+00:00\",\"description\":\"First aid against ransomware attacks: What to do as soon as possible and what you're better off avoiding to minimize the damage.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/first-aid-against-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/first-aid-against-ransomware\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/first-aid-against-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"First aid against ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"First aid against ransomware - IKARUS Security","description":"First aid against ransomware attacks: What to do as soon as possible and what you're better off avoiding to minimize the damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"First aid against ransomware - IKARUS Security","og_description":"First aid against ransomware attacks: What to do as soon as possible and what you're better off avoiding to minimize the damage.","og_url":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2024-12-05T08:42:23+00:00","twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/","url":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/","name":"First aid against ransomware - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"datePublished":"2024-04-24T09:12:58+00:00","dateModified":"2024-12-05T08:42:23+00:00","description":"First aid against ransomware attacks: What to do as soon as possible and what you're better off avoiding to minimize the damage.","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/first-aid-against-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"First aid against ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/33472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=33472"}],"version-history":[{"count":8,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/33472\/revisions"}],"predecessor-version":[{"id":37695,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/33472\/revisions\/37695"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=33472"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=33472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}