Information Security

What to Do When Your Computer Becomes a Hostage

Ransomware is a type of malicious software that is designed by cybercriminals to “hijack” an individual’s or business’ computer until the victim pays a sum of money. This cyber threat may infect a network and render it inaccessible to the user until the ransom is paid. Cyber fraudsters make computer data, files, and networks unusable through locking screens, encrypting information, and other malicious techniques.

Hackers can deliver ransomware through a variety of methods, but it is most often delivered in the form of fraudulent emails, known as phishing attempts. Ransomware may also be included in pop-up ads and other online advertisements.

Users should remember the following to combat cybersecurity threats at work and at home:

n Remain extra vigilant if receiving communication from an account claiming to be “trusted entity.”

n Avoid responding to any spam-type emails.

n Refrain from sending personal information via email. Legitimate businesses will not ask users to send their sensitive personal information through email.

n Do not input your personal or login information in an unknown pop-up Internet browser window.

n Avoid clicking on hyperlinks from unknown or untrusted sources.

n Do not install software or purported updates from unknown sites.

n Run antivirus and antimalware software.

n Back up data regularly.

Identify Ransomware

The consequences of a ransomware infection can be significant and may affect the entire Postal Service™ system network.

It is important that you readily identify and report ransomware attempts, so you can protect USPS® from a potentially dangerous attack.

Here are some common signs that your computer has been infected by ransomware:

n You receive a pop-up message saying your computer is being held for ransom.

n Files or data are suddenly inaccessible.

n Files have been edited when no changes should have occurred.

n Files appear, disappear, or change in size.

n Systems display strange messages, contain new content, or are reorganized.

n Systems become slow, unstable, or inaccessible.

n Unexpected processes like email transmissions or other programs running on their own.

Properly Respond to Ransomware

Don’t wait to report a ransomware infection. If you believe your computer or device has been infected by ransomware, promptly take the following steps to respond:

n Stop work on the affected computer or device as soon as you notice a sign of infection.

n Do not communicate with any unknown individuals requesting ransom or information about the availability of data on your computer or device.

n Notify the Cybersecurity Operations Center (CSOC) by emailing CyberSafe@usps.gov.

n Alert your manager or supervisor about the incident.

Online security is a priority for USPS employees, suppliers, and customers: When you take simple steps to protect yourself online, you create a safer Internet for your family and coworkers.