There are types of malware that can lock your mobile phone screen, send you messages and restrict access to information (Picture: El Español)

There cyberpolice of the Secretary of Citizen Security (CSS) alerted to a Ransomwarea kind of malicious program better known as malware, that criminals can use to block your cell phone or computer screen, send you pop-up messages and, in severe cases, steal or encrypt files. Often, cybercriminals demand payment to get your device back.

The criminals they can restrict access to certain parts of the operating system and send messages in which they indicate that the device has been blocked due to some type of illegal activity, so they demand a pay.

He malware can reach your smartphone by email attachments, malicious URLs (webpage addresses), malicious advertisements or pirated software.

Cyberpolice stressed that the information can be retrieved free of charge (Photo: REUTERS/Kacper Pempel)
Cyberpolice stressed that the information can be retrieved free of charge (Photo: REUTERS/Kacper Pempel)

In case of being the victim of an attack of this type, the Cyber ​​​​Police warned that there is no need to pay the ransom because it is possible to recover the files using free decryptors. He further explained what to do in specific situations:

– If your screen is locked, perform a full system restore and run a scan from a bootable CD or USB.

– If the system slows down for no apparent reason, it may be a case of file encryption, so it is recommended Disconnect the computer from the Internet and turn it off. If the malware is still present when you turn it back on, download and install a security product and run a full scan.

The SSC has warned that this ransomware can arrive through means such as malicious emails, URLs and advertisements (Picture: Twitter @SSC_CDMX)
The SSC has warned that this ransomware can arrive through means such as malicious emails, URLs and advertisements (Picture: Twitter @SSC_CDMX)

The mobile phones most susceptible to this type of cyberattack are those with information storage servers (SITES) that do not have an updated version. That’s why he recommends considering the following to reduce the chances of downloading this code:

– Have a computer security program with real-time protection.

– Employ a online storage.

One way to avoid downloading malware is to keep your device up to date (Photo: Zacharie Scheurer/dpa)
One way to avoid downloading malware is to keep your device up to date (Photo: Zacharie Scheurer/dpa)

– Remember to physically disconnect devices from the computer after performing a backup.

– Check that the systems and software are always up to date, for which it is advisable to activate automatic updates.

Any mobile device connected to data networks and Wi-Fi is at risk of a cyberattack; however, as an owner, it is possible to reduce the risk of information theft and other crimes.

This is why the SSC Service Management, Cybersecurity and Technology Development Branch has prepared the Cyber ​​2.0with cybersecurity tips.

Every mobile device connected to the internet is at risk of downloading malware (Photo: Unsplash)
Every mobile device connected to the internet is at risk of downloading malware (Photo: Unsplash)

– Activate the protect and lock with a passwordbiometric or pattern validation.

– Do not neglect devices in public places and even less if they are unlocked.

Enable device encryption feature and storage units if the option is available.

Disable geolocation in applications where its use is not required.

– Dungeon updated operating system up to its most recent version.

– Disable wifi, infrared and bluetooth when these connections are not in use.

Cyberattacks can be prevented by following a few tips (Picture: File)
Cyberattacks can be prevented by following a few tips (Picture: File)

– Avoid plugging devices into public charging stations or unknown computer equipment.

Do not connect to public wireless networks or who ask you for personal information.

Make sure your device cameras are covered physically, mostly on laptops.

– Download and use only Software which are available in official stores.

– Activate the “Locate and Recover Device” function offered by equipment manufacturers.

– In the event that the device requires repair, delete or back up information, remove all storage drives, and, if possible, have it repaired in front of you.

In addition to these tips, the guide contains information on security in working from home and on social networks, ways to create secure passwords, among other topics.

Categorized in: