How to protect yourself against Trojans
Disguised as an invoice, an application or a fax, the Trojan (Locky, TeslaCrypt, Cryptolocker or Cryptowall) finds its way via email or as a drive-by download into your mailbox. It ultimately encrypts all your data and demands a ransom.
The malware encrypts all data to which you have writing access to. Hence, not just local stored data is affected but also USB sticks, network resources as well as cloud storage services. Subsequently, a ransom is demanded, nevertheless the Criminal Investigation Department advises against any payments.
We’ve put together the following tips which can help you to protect yourself against Trojans:
- Pay attention to the actuality of systems and keep operating systems, all applications (Office, Acrobat Reader, java etc.) browsers and plug-ins updated and thereby secure.
- Watch out for the up-to-dateness of your virus scanner definitions.
- Configure your email program that no script is being executed automatically.
- When receiving emails check the sender and in case of any doubt don’t open the attachment, especially if the sender is unknown to you.
- Never open attachments with endings as .exe, .bat, .com, .vbs, .js.
- If possible, check the mail server from which the email has been sent.
- Make sure that macro code is not being executed at all or just after consultation.
- Don’t click on any links which are displayed in emails or on social media platforms, as long as you are not certain about their safety.
- Backup your data regularly.
- Pay attention to how and where you store your backup to which no one should have access to. Otherwise, the Trojan can also encrypt this data and therefore you will lose all chances of accessing your data.