Sunday 11 Jan 2026 Abu Dhabi UAE
Prayer Timing
Today's Edition
Today's Edition
UAE

How to protect yourself from ransomware attacks

Dr. Mohamed Hamad Al Kuwaiti
23 Oct 2025 01:00

Dr. Mohamed Hamad Al Kuwaiti
The writer is the head of the UAE’s Cybersecurity Council

Ransomware is a serious cybersecurity threat that prevents users from accessing their systems or personal files by encrypting data or locking devices. Attackers typically demand a ransom - often in the form of digital currencies such as Bitcoin - in exchange for restoring access.

These malicious programmes exploit sophisticated techniques that allow them to spread rapidly across networks, making them capable of paralysing individuals, organisations, and government entities alike.

Over time, ransomware has evolved from simple, isolated incidents into highly organised attacks targeting critical infrastructure, resulting in significant financial losses and the disruption of essential services.

Ransomware typically spreads through several common channels, the most prominent being phishing emails. These emails often contain malicious attachments or links that, when clicked, can infect a system. Fraudulent emails or web pages can often be identified by poor spelling, incorrect formatting, or strange symbols and spacing - warning signs that users should be aware of to avoid falling victim.

In addition to email-based scams, ransomware can also spread through malicious online advertisements known as malvertising, which redirect users to infected websites. Social media platforms and direct cyberattacks that exploit network security vulnerabilities are also common vectors.

Ransomware varies in form: some strains encrypt files, others lock the user’s screen, and some threaten to leak stolen data unless a ransom is paid.

Examples of ransomware methods include malspam - emails with deceptive attachments or links - along with malvertising, which can automatically redirect users to criminal servers that install ransomware without any user interaction, a technique known as drive-by downloads.

Attackers also rely heavily on social engineering - impersonating trusted sources to trick users into opening dangerous files or clicking on legitimate-looking links, thereby enabling unauthorised access and spreading the infection across systems.

There are several types of ransomware, including scareware, which displays fake security alerts demanding payment without actually encrypting files; screen lockers, which completely block access to the device; and the more dangerous encrypting ransomware, which locks files using strong encryption and stores the decryption keys on remote servers. In recent years, organisations have become increasingly targeted, with attacks growing in complexity and scale.

These types of attacks present serious challenges for individuals and institutions.

Often, ransomware goes undetected until encryption is complete, leaving users with few options. Paying the ransom does not guarantee the recovery of data - in fact, it may encourage cybercriminals to strike again. Over the past few years, ransomware incidents have risen sharply in both frequency and severity, with large corporations and government agencies becoming primary targets.

To defend against ransomware, a proactive and comprehensive cybersecurity strategy is essential. This includes regularly updating systems and software, implementing advanced security solutions, and performing frequent backups of important data to offline or separate storage.

It’s equally important to train users to recognise phishing attempts and follow best practices for digital security.

If a ransomware infection occurs, the affected device should be immediately isolated from the network to prevent further spread, and cybersecurity professionals should be contacted.

Users should also ensure that their operating systems are up to date and that built-in security features are enabled. Important files should be stored on reliable cloud services that offer malware protection and file version recovery options.

If ransomware is suspected, a full system scan should be conducted using reputable antivirus software before attempting any data recovery.

If files have already been encrypted, it is strongly advised not to pay the ransom, as there is no guarantee of data restoration. The most effective response is to wipe the infected system and restore data from previously created backups.

Establishing good digital hygiene and regular security practices is key to preventing future infections.

Ultimately, addressing ransomware threats requires collective efforts from individuals, organisations and governments. Strengthening international cooperation in combating cybercrime and investing in advanced cybersecurity technologies is crucial.

Resilient systems that can recover quickly from attacks, ongoing awareness campaigns, and continuous preparedness are vital pillars in this fight - because, in cybersecurity, prevention is always better than cure.

Copyrights reserved to Aletihad News Center © 2026