RansomeWare Instructions

If you discover a ransomware attack on your computer, immediate and methodical action is required to contain the infection and begin recovery.

Immediate Isolation

    • Disconnect the Network: Immediately unplug Ethernet cables and turn off Wi-Fi and Bluetooth to prevent the ransomware from spreading to other devices or cloud storage.
    • Unplug External Devices: Disconnect external hard drives, USB sticks, and any connected mobile devices to ensure they are not encrypted next.
    • Do Not Power Off: Experts generally recommend keeping the computer on. Turning it off can destroy volatile evidence in the RAM that forensic investigators need to identify the ransomware strain.

      Document the Attack

      • Take Photos: Use a separate device (like your phone) to take clear pictures of the ransom note and any on-screen messages.
      • Note Specifics: Identify the file extension of the encrypted files and any contact information provided by the attackers.

        Report the Incident

          Recovery Without Paying

          • Do Not Pay: The FBI and security experts strongly advise against paying. Payment does not guarantee data recovery, funds criminal activity, and may violate sanctions laws if the recipient is a restricted entity.
          • Check for Decryptors: Use an uninfected computer to visit the No More Ransom Project to see if a free decryption tool exists for your specific ransomware variant.
          • Restore from Backups: The most effective recovery method is to wipe the infected system completely and restore your files from a clean, offline backup.
          • Reset Passwords: Once the infection is cleared, reset all passwords for your accounts (email, banking, cloud storage) from a clean device, as your credentials may have been stolen during the attack.