-
Crime
- Commercial Crimes
- Dishonest Misappropriation Of Property
- Cybercrime
- Family Violence
- Housebreaking
- Theft In Dwelling
- Motor Vehicle Theft
- Outrage of Modesty
- CDSA and CMA Bill Amendments
- Misuse of SIM Card Offences
- Sexual Crime
- Voyeurism
- Snatch Theft
- Scams
- Theft Of Bicycle and Personal Mobility Devices
- Unlicensed Moneylending
- Crime Prevention Posters
- Scams Bulletin
- Traffic
- Airport Security
- Online Criminal Harms Act
- Infrastructure Protection
- Security Outcome-Based Contracting
- Crime
- Commercial Crimes
- Dishonest Misappropriation Of Property
- Cybercrime
- Family Violence
- Housebreaking
- Theft In Dwelling
- Motor Vehicle Theft
- Outrage of Modesty
- CDSA and CMA Bill Amendments
- Misuse of SIM Card Offences
- Sexual Crime
- Voyeurism
- Snatch Theft
- Scams
- Theft Of Bicycle and Personal Mobility Devices
- Unlicensed Moneylending
- Crime Prevention Posters
- Scams Bulletin
- Traffic
- Traffic Matters
- Road Safety Tips
- Road Safety Campaigns
- Road Safety Challenge
- Airport Security
- Known Consignor Regime
- Regulated Air Cargo Agent Regime
- Online Criminal Harms Act
- Introduction to OCHA
- Application for Reconsideration
- Appeal to Reviewing Tribunal
- Codes of Practice
- Appeal to Minister
- Infrastructure Protection
- Infrastructure Protection Act
- Protected Areas and Protected Places
- Special Developments / Special Infrastructures
- Building Security
- Security Outcome-Based Contracting
- Security Outcome-Based Contracting
Ransomware is a type of malware designed to encrypt files on a device until a ransom, typically in cryptocurrency, is paid to decrypt the files. Some ransomware variants will also try to spread to other machines on the network and, in some cases, victims’ data might be exfiltrated.
Ransom payments are strongly discouraged. Payments do not guarantee that the data will be decrypted, or that your data will not be published by the threat actors. It also encourages threat actors to continue their criminal activities and target more victims. Threat actors may also see your organisation as a soft target and may strike again in the future.
Reporting Ransomware
Lodge a report on ransomware.
Decryption Tools
Search for decryption tools to recover encrypted files in your system.
FAQs on Ransomware
Learn more about ransomware.
Ransomware Advice
Learn how to prevent a ransomware attack and the steps to take after an attack.
Ransomware Trends
Find out the latest about ransomware trends.
Cybersecurity Initiatives
Local and international initiatives to enhance cybersecurity.