{"id":19641,"date":"2022-01-21T14:34:45","date_gmt":"2022-01-21T14:34:45","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=19641"},"modified":"2026-03-23T09:49:53","modified_gmt":"2026-03-23T09:49:53","slug":"how-to-stop-ransomware-in-action","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/","title":{"rendered":"How to Stop Ransomware in Action"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">What would you do if your device was suddenly taken over by malware? Without warning, your files and data are encrypted and you can longer read or open them. Everything of value on your device is now suddenly scrambled into nonsense, and the only way you\u2019re getting it all back is to pay the ransom to an unknown hacker.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While this may sound like a nightmare, it\u2019s a genuine possibility for many individuals and organizations across the globe. So, what can you do to combat it? We say &#8211; have a plan. Ransomware thrives on knee-jerk reactions and poor, haphazard choices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/how-ransomware-works\/\">Ransomware is a type of malware<\/a> that infects your data and documents, encrypting it with a key that only the hacker holds. The hacker typically demands a ransom, and if it isn\u2019t paid within the timeframe (usually 24 to 48 hours), then the data is erased for good.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s absolutely imperative to know <\/span><b><a href=\"https:\/\/easydmarc.com\/blog\/why-is-it-so-hard-to-find-a-single-protection-against-ransomware\/\">how to protect yourself from ransomware<\/a>\u00a0<\/b><span style=\"font-weight: 400;\"><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-ransomware-attacks\/\">before an attack happens<\/a>. But what if it\u2019s too late?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keep reading for steps on <\/span><b>how to stop ransomware attacks<\/b><span style=\"font-weight: 400;\"> that are already harming your network.<\/span><\/p>\n<h2><b>Isolate the Infected Device<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The first thing you\u2019ll need to know is <\/span><b>how to stop ransomware from spreading<\/b><span style=\"font-weight: 400;\">. It\u2019s especially important if you\u2019re part of an enterprise or organization. What separates a mild annoyance from malware that can literally bankrupt a company overnight is how far the ransomware is allowed to spread. So immediately disconnect any devices attached to your infected system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unplug drives, make sure there are no wireless connections from the infected device to other ones, and disconnect it from the network. Quick reaction time is vital with this step. As soon as the infection is located, it\u2019s imperative that you isolate the system with haste to stop the virus from spreading.<\/span><\/p>\n<h2><b>Disconnect All the Devices From the Network<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now that you\u2019ve isolated the infected system, it\u2019s time to worry about the network. Many forms of malware don\u2019t just dig their roots into one computer. They go straight for the network.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ensure that every single device you can disconnect is detached as soon as possible. Always assume that the ransomware is swimming around in the network. Your goal now is to make sure that it has no way to access systems via connections.<\/span><\/p>\n<h2><b>Assess the Damages<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now that you\u2019ve disconnected the devices and isolated your main system, it\u2019s time to look over the damages. Check shared drives and folders, network storage devices, and external, USB, and cloud folders. Check any known locations of important data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How far was the malware allowed to spread, and what did it manage to reach? In best-case scenarios, you may have been quick enough to stop it from reaching too much data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In fact, you might not be missing anything that you don\u2019t have backups for. However, in worse-case scenarios, you may be distraught to find that massive amounts of data are now encrypted and unrecoverable. Regardless, take note of the damage.<\/span><\/p>\n<h2><b>Determine if Any Credentials or Data Have Been Stolen<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This is the most important part of looking over the damage. How valuable is the missing data? Are important credentials and vital information now gone or encrypted? Determining the value of the missing information and the replaceability of said data will dictate how you respond to the attack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, under no conditions should you respond hastily without a plan. Even if you have important credentials that have been infected, ransomware attackers aren\u2019t always going to keep their word and return your info.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It would be unwise to assume that these attackers are honest enough to stick to their terms. So even in a worst-case scenario, take a minute to consider your options.<\/span><\/p>\n<h2><b>Locate Patient Zero<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now that you\u2019ve gotten an understanding of the overall damage, you can start looking at the source of the infection. Knowing where the malware first started makes it much more manageable. However, this isn\u2019t always an easy process. It\u2019s common for ransomware to require some sort of action on the receiving end in order to spread. Typically, this is through the opening of an email or a faulty link.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Retrace the steps of the virus and ask employees about their recent activity. This helps you determine possible entry points. In some circumstances, the encrypted files even have an \u201cowner\u201d in the properties. This owner is often the one used as an entry point for the malware.<\/span><\/p>\n<h2><b>Identify the Ransomware Type (Strain)<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Now it\u2019s time to look into what form of ransomware you could be dealing with. It\u2019s important to understand because there are actual treatments and recommended responses for different types of ransomware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of the biggest types out there are strains like Bad Rabbit, GoldenEye, Locky, Maze, Ryuk, Dharma, etc. Look up the symptoms of your strain and see what types of ransomware it could match.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This step will help you understand what method of recovery you can use later.<\/span><\/p>\n<h2><b>Report the Ransomware to Authorities<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before moving on to how you\u2019ll deal with the matter, you should report the infection to the authorities. It\u2019s best to get some investigation on the matter in the hopes of preventing any future attacks. Without giving the attacker any sort of consequence, they can continue attacking victims. In order to help <\/span><b>stop ransomware<\/b><span style=\"font-weight: 400;\">, you should report the attack immediately.<\/span><\/p>\n<h2><b>Evaluate Your Backups<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In best-case scenarios, a response might not even be necessary. Before you look into your response options, look through your backups. The ideal situation would be if you had fairly updated backups of most of the important data that was lost, and none of the backups were hit by the infection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In that case, you may not need to respond to the attacker at all. The hacker has failed, and as long as you isolate the infection and recover your system from the backups, you\u2019ll be fine. However, in most scenarios, this is not the case. If so, it\u2019s time to consider your options.<\/span><\/p>\n<h2><b>Research Your Decryption Options<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If you\u2019ve done research on your strain\u2019s behavior, you should have an idea of what kind of ransomware you\u2019re dealing with. Use this to look up decryption options. Many times, there are organizations and efforts that can help undo the damage and <\/span><b>stop <a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\">ransomware<\/a><\/b><span style=\"font-weight: 400;\"> attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the best places<\/span><span style=\"font-weight: 400;\"> you can visit is a site called <\/span><a href=\"https:\/\/www.nomoreransom.org\/en\/index.html\"><span style=\"font-weight: 400;\">No More Ransom<\/span><\/a><span style=\"font-weight: 400;\">, where you can access tools and upload copies of encrypted files in order to be matched with the proper decryption process.<\/span><\/p>\n<h2><b>Choose a Response Option<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">If none of this was sufficient in returning your files, it might be high time to face the music. There\u2019s a chance those files are lost forever. In most cases, it\u2019s not recommended to ever pay the ransom, as there\u2019s a good chance you won\u2019t even receive the means to decrypt your files after it\u2019s been paid.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, if the files are that vital, you may consider if the demanded ransom expense is worth the chance at reclaiming them.<\/span><\/p>\n<h2><b>Final Thoughts<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">While it\u2019s much easier to prevent ransomware than fight against it, there\u2019s still something you can do. If you\u2019ve been vigilant regarding your backups and have maintained healthy cyber awareness levels in your organization, ransomware shouldn\u2019t be able to penetrate your system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Still, even if it did, you have more than a few options before you consider paying the ransom.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/how-to-prevent-ransomware-attacks\/\"><span style=\"font-weight: 400;\">How to Prevent Ransomware Attacks?<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/%e2%80%8b%e2%80%8bhow-to-detect-ransomware\/\"><span style=\"font-weight: 400;\">\u200b\u200b<\/span><\/a><a href=\"https:\/\/easydmarc.com\/blog\/how-to-detect-ransomware\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">How Ransomware Works?<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-attacks-a-complete-guide\/\"><span style=\"font-weight: 400;\">Ransomware Attacks: A Complete Guide<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/ransomware-vs-malware-vs-phishing\/\"><span style=\"font-weight: 400;\">Ransomware vs. Malware vs. Phishing<\/span><\/a><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/easydmarc.com\/blog\/why-is-it-so-hard-to-find-a-single-protection-against-ransomware\/\"><span style=\"font-weight: 400;\">Why Is It So Hard to Find a Single Protection Against Ransomware?<\/span><\/a><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What would you do if your device was &#8230;<\/p>\n","protected":false},"author":5,"featured_media":19642,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,290,199,294],"tags":[],"class_list":["post-19641","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity","category-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to Stop Ransomware in Action | EasyDMARC<\/title>\n<meta name=\"description\" content=\"It\u2019s much easier to stop ransomware before it happens. Still, even if it&#039;s in action, you can stop it. Learn more in our checklist!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Stop Ransomware in Action\" \/>\n<meta property=\"og:description\" content=\"It\u2019s much easier to stop ransomware before it happens. Still, even if it&#039;s in action, you can stop it. Learn more in our checklist!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-21T14:34:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-23T09:49:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hasmik Khachunts\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hasmik Khachunts\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/\"},\"author\":{\"name\":\"Hasmik Khachunts\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\"},\"headline\":\"How to Stop Ransomware in Action\",\"datePublished\":\"2022-01-21T14:34:45+00:00\",\"dateModified\":\"2026-03-23T09:49:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/\"},\"wordCount\":1293,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/12.01-7.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\",\"Ransomware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/\",\"name\":\"How to Stop Ransomware in Action | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/12.01-7.jpg\",\"datePublished\":\"2022-01-21T14:34:45+00:00\",\"dateModified\":\"2026-03-23T09:49:53+00:00\",\"description\":\"It\u2019s much easier to stop ransomware before it happens. Still, even if it's in action, you can stop it. Learn more in our checklist!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/12.01-7.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/12.01-7.jpg\",\"width\":1440,\"height\":910,\"caption\":\"12.01 7\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/how-to-stop-ransomware-in-action\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Ransomware\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/ransomware\\\/\"},{\"@type\":\"ListItem\",\"position\":6,\"name\":\"How to Stop Ransomware in Action\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/1ee4f162a98bccc5ff8b6fefdfaf245c\",\"name\":\"Hasmik Khachunts\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g\",\"caption\":\"Hasmik Khachunts\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/hasmik\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Stop Ransomware in Action | EasyDMARC","description":"It\u2019s much easier to stop ransomware before it happens. Still, even if it's in action, you can stop it. Learn more in our checklist!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/","og_locale":"en_US","og_type":"article","og_title":"How to Stop Ransomware in Action","og_description":"It\u2019s much easier to stop ransomware before it happens. Still, even if it's in action, you can stop it. Learn more in our checklist!","og_url":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2022-01-21T14:34:45+00:00","article_modified_time":"2026-03-23T09:49:53+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","type":"image\/jpeg"}],"author":"Hasmik Khachunts","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"Hasmik Khachunts","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/"},"author":{"name":"Hasmik Khachunts","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c"},"headline":"How to Stop Ransomware in Action","datePublished":"2022-01-21T14:34:45+00:00","dateModified":"2026-03-23T09:49:53+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/"},"wordCount":1293,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity","Ransomware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/","url":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/","name":"How to Stop Ransomware in Action | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","datePublished":"2022-01-21T14:34:45+00:00","dateModified":"2026-03-23T09:49:53+00:00","description":"It\u2019s much easier to stop ransomware before it happens. Still, even if it's in action, you can stop it. Learn more in our checklist!","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","width":1440,"height":910,"caption":"12.01 7"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/how-to-stop-ransomware-in-action\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Ransomware","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/ransomware\/"},{"@type":"ListItem","position":6,"name":"How to Stop Ransomware in Action"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/1ee4f162a98bccc5ff8b6fefdfaf245c","name":"Hasmik Khachunts","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/556e30ecef3fde7f1400ab37fa210642b14cd1a6cf57ae3d669996eb5324fc9e?s=96&r=g","caption":"Hasmik Khachunts"},"url":"https:\/\/easydmarc.com\/blog\/author\/hasmik\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2022\/01\/12.01-7.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19641","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=19641"}],"version-history":[{"count":4,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19641\/revisions"}],"predecessor-version":[{"id":39859,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/19641\/revisions\/39859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/19642"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=19641"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=19641"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=19641"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}