www.cisa.gov
Open in
urlscan Pro
104.109.89.120
Public Scan
URL:
https://www.cisa.gov/stopransomware
Submission: On October 21 via api from US — Scanned from DE
Submission: On October 21 via api from US — Scanned from DE
Form analysis
3 forms found in the DOMGET https://search.us-cert.gov/search
<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-xs searchbox" method="get">
<input name="utf8" type="hidden" value="✓"><input id="affiliate-desktop" name="affiliate" type="hidden" value="cisa">
<div class="form-group">
<label class="sr-only" for="query-desktop">Enter Search Terms(s):</label>
<div class="input-group">
<input autocomplete="off" class="form-control form-control-custom input-lg" id="query-desktop" name="query" placeholder="Search" type="text">
<div class="input-group-addon input-group-addon-custom">
<button class="submit input-lg"><img alt="search icon" src="/sites/default/files/srware/images/search-icon.png" title="search icon"></button>
</div>
</div>
</div>
</form>
GET https://search.us-cert.gov/search
<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="hidden-lg hidden-md searchbox" method="get">
<input name="utf8" type="hidden" value="✓"><input id="affiliate-mobile" name="affiliate" type="hidden" value="cisa">
<div class="form-group">
<label class="sr-only" for="query-mobile">Enter Search Terms(s):</label>
<div class="input-group">
<input autocomplete="off" class="form-control form-control-custom input-lg" id="query-mobile" name="query" placeholder="Search" type="text">
<div class="input-group-addon input-group-addon-custom">
<button class="submit input-lg"><img alt="search icon" src="/sites/default/files/srware/images/search-icon.png" title="search icon"></button>
</div>
</div>
</div>
</form>
GET https://search.us-cert.gov/search
<form accept-charset="UTF-8" action="https://search.us-cert.gov/search" class="searchbox" method="get"><input name="utf8" type="hidden" value="✓"><input id="affiliate-desktop-footer" name="affiliate" type="hidden" value="cisa">
<div class="form-group"><label class="sr-only" for="query-desktop-footer">Enter Search Terms(s):</label>
<div class="input-group"><input autocomplete="off" class="form-control form-control-custom input-lg" id="query-desktop-footer" name="query" placeholder="Search" type="text">
<div class="input-group-addon input-group-addon-custom"><button class="submit input-lg"><img alt="search icon" src="/sites/default/files/srware/search-icon-footer.png" title="search icon"></button></div>
</div>
</div>
</form>
Text Content
Skip to main content An official website of the United States government Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock () or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites. Enter Search Terms(s): -------------------------------------------------------------------------------- Toggle navigation Enter Search Terms(s): STOP RANSOMWARE NAV * Resources * Newsroom * Alerts * Report Ransomware -------------------------------------------------------------------------------- TLP:WHITE TLP:WHITE PROTECTION AND RESPONSE SERVICES K-12 RESOURCES PREPARATION RANSOMWARE IS A FORM OF MALWARE DESIGNED TO ENCRYPT FILES ON A DEVICE, RENDERING ANY FILES AND THE SYSTEMS THAT RELY ON THEM UNUSABLE. MALICIOUS ACTORS THEN DEMAND RANSOM IN EXCHANGE FOR DECRYPTION. STOPRANSOMWARE.GOV IS THE U.S. GOVERNMENT'S OFFICIAL ONE-STOP LOCATION FOR RESOURCES TO TACKLE RANSOMWARE MORE EFFECTIVELY. HOW WE CAN HELP GENERAL INFORMATION FAQS TIPS RANSOMWARE READINESS SELF-ASSESSMENT GUIDANCE AND RESOURCES Ransomware is an ever-evolving form of malware designed to encrypt files on a device, rendering any files and the systems that rely on them unusable. Malicious actors then demand ransom in exchange for decryption. These resources are designed to help individuals and organizations prevent attacks that can severely impact business processes and leave organizations without the data they need to operate and deliver mission-critical services. READ MORE TIPS & GUIDANCE Ransomware incidents can severely impact business processes and leave organizations without the data they need to operate and deliver mission-critical services. The economic and reputational impacts of ransomware incidents, throughout the initial disruption and, at times, extended recovery, have also proven challenging for organizations large and small. Apply these tips and practices to avoid attack. GOOD CYBER HYGIENE HABITS KEEP YOUR NETWORK HEALTHY Conduct regular vulnerability scanning to identify and address vulnerabilities, especially those on internet-facing devices, to limit the attack surface. WHEN IN DOUBT, REPORT IT OUT Victims of ransomware should report to federal law enforcement via IC3 or a Secret Service Field Office, and can request technical assistance or provide information to help others by contacting CISA. BACKING UP IS YOUR BEST BET Maintain offline, encrypted backups of data and regularly test your backups. KEEP CALM AND PATCH ON Regularly patch and update software and Operating Systems. Learn More REPORT AN INCIDENT 1. Victims of ransomware should report to federal law enforcement via IC3 or a Secret Service Field Office, and can request technical assistance or provide information to help others by contacting CISA. REPORT CONTACT Enter Search Terms(s): Accountability Privacy Policy FOIA No Fear Act Accessibility Plain Writing Plug-ins Inspector General DHS The White House USA.gov