Manage ransomware intrusion

Discussion in 'malware problems & news' started by pb1, May 31, 2025 at 12:34 PM.

  1. pb1

    pb1 Registered Member

    Joined:
    Apr 4, 2014
    Posts:
    1,476
    Location:
    sweden
    Hi

    I wonder how one should handle ransomware intrusion.

    Lets say you have been infected by a really potent ransomware, how does your plan for handling that look like? If it is really potent, as far as i know there is no handling to solve it since the ransomware will stop/block/destroy any action to fix the situation. If one connects an external disc to the pc to use an image to recover the Os, the moment one opens that disc, it will also be infected. In that scenario the infected disc is useless and unrecoverable.

    So, which is the best way to go about to nullify a ransomware damage and hopefully restore the infected disc, or at least be able to use it securely in a future?
     
  2. digmor crusher

    digmor crusher Registered Member

    Joined:
    Jul 6, 2012
    Posts:
    1,290
    Location:
    Canada
    1. Get rid of the ransomware by either going to a site that specializes malware removal or by reformatting your computer.
    2. Recover all your data from either a cloud backup or hard drive backup.
    3. Re-install all the programs you had on your computer if you reinstalled Windows in step 1.
     
  3. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,104
    Location:
    Canada
    I'm pretty sure this is not an issue if one boots from a recovery media such as a rescue usb drive.
     
  4. Palancar

    Palancar Registered Member

    Joined:
    Oct 26, 2011
    Posts:
    2,519
    With proper backups this would be a simple recovery process. The backups will not get hurt if the computer is cleaned first. Additionally the backup media can be made read ONLY before it ever sees the dirty computer. By being "read only" that backup media can be used again and again without fear. A small but simple example is a MicroSD, which can be quite large in space. They are easily and fully locked to write by physical switches not simply software locks. Hardware locked devices are more reliable and solid than using software locks.


    Depending upon your level of computer expertise the one outstanding item is confirming the bios is good to go. That is a rare attack because it requires advanced attacks. My bios can be unlocked by me and confirmed via sha256sum that nothing changed at all. One flipped digit and the sum won't match.
     
  5. cruelsister

    cruelsister Registered Member

    Joined:
    Nov 6, 2007
    Posts:
    1,693
    Location:
    Paris
    As was noted above, just restarting and booting from a Recovery Disk made by your imaging software in order to restore an old image would be fine as long as we are speaking of an air-gapped external drive.

    However many will save images on an internal secondary drive, and here issues may arise. Although most ransomware is specific in the types of files to be encrypted (docs, jpg, etc), some will be destructive to many other files on the system including saved images and backups. Of the popular Imaging solutions available, Macrium Pro offers protection from any ransomware attacks on their created images (Image Guardian). If you have any interest, I made a video about it here:
    hxxps://www.youtube.com/watch?v=aAzXnaKbRB4
     
  6. pb1

    pb1 Registered Member

    Joined:
    Apr 4, 2014
    Posts:
    1,476
    Location:
    sweden
    Thank you for your responses.

    To sum it up; it will work if i use a usb with a bootable W11 ISO that is "read only" for fresh install Windows by wiping the disc first?

    After that i can use my rescue disc to boot from and install my previously made image of the system, and that will be it!?

    The above will then work in most cases if i will not be hit by some very advanced ransomware which is unlikely for me as a basic Pc user?
     
  7. wat0114

    wat0114 Registered Member

    Joined:
    Aug 5, 2012
    Posts:
    4,104
    Location:
    Canada
    If you have backups of all relevant Windows partitions, including the System, then you should be able to skip the formatting of the disk, and just boot into the rescue recovery environment to write the backups over top the infected disk. Hopefully you have some sort of reliable backup software installed and rescue disk, and are familiar with how to use it. Hasleo free backup/recovery suite has worked well for me, but of course there are others available as well, although not necessarily free. Hasleo allows you to create an emergency rescue pendrive, as well as install a boot menu to your drive.

    Hasleo menu.png
     
  8. pb1

    pb1 Registered Member

    Joined:
    Apr 4, 2014
    Posts:
    1,476
    Location:
    sweden
    Thank you for the reply!
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.