CORPUS CHRISTI (361) 653-1777
SAN ANTONIO (210) 904-9177
Close this search box.


Has Ransomware Been Installed On Your Computer Systems?


A sign that your computer had ransomware installed on it (and that you have been hacked) are that your web browser or desktop is locked with a message about how to pay to unlock your system and/or your file directories contain a “ransom note” file that is usually a .txt file.

Your files could have a new file extension appended to the file names.

  • Examples of Ransomware file extensions: .ecc, .ezz, .exx, .zzz, .xyz, .aaa, .abc, .ccc, .vvv, .xxx, .ttt, .micro, .encrypted, .locked, .crypto, _crypt, .crinf, .r5a, .XRNT, .XTBL, .crypt, .R16M01D05, .pzdc, .good, .LOL!, .OMG!, .RDM, .RRK, .encryptedRSA, .crjoker, .EnCiPhErEd, .LeChiffre, .keybtc@inbox_com, .0x0, .bleep, .1999, .vault, .HA3, .toxcrypt, .magic, .SUPERCRYPT, .CTBL, .CTB2, .locky or 6-7 length extension consisting of random characters

Disconnect from all networks:

  • Unplug Ethernet cables and disable wifi or any other network adapters. 
  • Put your device in Airplane Mode
  • Turn off Wi-Fi and Bluetooth

This can stop the ransomware from spreading further to shared network resources such as file shares.

  • Immediately disconnect all external devices:
  • USB drives or memory sticks
  • Attached phones or cameras
  • External hard drives

Ransomware is a type of malware that infects a computer. Both businesses (big and small) and individuals can fall victim to ransomware.
An alert will usually pop up on the screen and tells the user that their files are encrypted, and all systems have been blocked from accessing. The only way to get access to the data is by paying the ransom that the “hacker” requested. After the user pays the ransom, the user should get access back to all compromised data.

Ransomware is commonly spread through phishing emails that contain malicious links.  Drive-by downloading also occurs when a user unknowingly visits an infected website. Malware is then downloaded and installed without the user’s knowledge. It can be weeks before a user realizes their system has been hacked.

  • Having a data backup and recovery plan in position for all data on your systems is essential to protect your business’s or personal data. Regular backups limit the risk of losing more data and expedites the recovery process. These backups should be done on an off-site location. 
  • Make sure your operating system and software are up to date on all current patches. 
  • Maintain up-to-date anti-virus software on your systems. 
  • Do not follow unrecognizable Web links in emails. Hover your cursor above the link before clicking on it to see where the link actually directs to. You can also avoid falling victim to phishing by directly searching for the page without clicking the link. 

How Can Straight Edge Technology Help You?

A business falling victim to ransomware can negatively effect not only their finances, but also their reputation. If a healthcare practice, law firm, or even a retail store has private data compromised then their customers will lose their trust to them. Let Straight Edge Technology help check off your list of cybersecurity must haves.

  • Managed Detection and Response

We investigate every new signal as if they were malicious and work to find the root cause to prevent any future security issues.

  • Cloud Monitoring

We ensure that your private and shared cloud assets are protected.

  • Endpoint Defense

We provide the right defenses for your endpoint assets. Our security reduces risk and minimizes threat actor dwell time.

We’re Ready To Work With You!

Call us or fill out this short form. We’ll reach out to set up a consultation.


2210 Patton St
Corpus Christi, TX
(361) 653-1777


17300 Henderson Pass
STE 200
San Antonio, Texas 78232
(210) 904-9177