What is Ransomware?
In the computer world, ransomware is a type of malicious software that “locks” up your files and demands payment to restore them. This software tricks the user into downloading it by masquerading as something else.
Once the user downloads it, their files immediately become unusable and they are told that they must pay money in order for their files to be unlocked.
How Does Ransomware Spread?
Ransomware spreads by pretending to be a legitimate file, malicious code, or email attachment. It often advertises the fake demonstration of a video game or other exciting clips and tricks users into clicking it. The ransomware then installs in the background without the user's knowledge.
This ransomware has been targeting the files located in the Documents, Pictures, and Videos on a computer by changing their extensions to .locked. Once this process is finished, it then informs the victim they need to pay a ransom in the form of Bitcoin in order for their files to be unlocked.
How to Remove Perdak Ransomware
The first step in removing Perdak Ransomware is finding and deleting any instances of ransomware on your computer. Once all traces of ransomware have been removed, you should restart your computer in safe mode. You can then go to the search engine and type in “regedit” to access the registry editor. Once you are in the registry editor, search for any files containing the words “Perdak Ransomware,” then delete them.
To retrieve your files try to restore them from a backup or a System Restore. point System Restore removes all changes made since Perdak Ransomware has been installed on your computer and reverts your computer back to its original settings. Restoring your computer may also remove certain Windows components that were installed along with Perdak Ransomware if it was not removed properly or in its entirety.
How to Protect My Computer From Ransomware
There are a few ways to protect your computer from ransomware:
- Always be aware of any emails that arrive on your computer. It is best to not open any attachments in any form if you are not expecting them.
- Using anti-malware software is also recommended. Make sure it is up-to-date and installed properly on all of your computers.
- Restrict access to the internet only after you perform a full install of Windows, then make sure you have a firewall active on all of your machines.