TL;DR
This guide shows you how to quickly check if files on your computer are encrypted using simple tools and techniques. We’ll cover methods for Windows, macOS, and Linux.
Checking for Encryption: A Step-by-Step Guide
- Understand What You’re Looking For
- Encrypted files aren’t readable without a password or key. They often have unusual file extensions (e.g., .aes, .locky) or no extension at all.
- Look for ransom notes – these are common with ransomware attacks that encrypt your files.
- Right-click the file you suspect is encrypted.
- Select ‘Properties’.
- Go to the ‘General’ tab.
- Look at the ‘Attributes’ section. If it says ‘Hidden’, ‘System’, or ‘Read-only’, this *could* indicate encryption, but isn’t definitive.
PowerShell can help identify file types and potentially encrypted files.
Get-FileHash -Path "C:pathtoyourfile.ext" | Format-List
Examine the ‘Algorithm’ field. Common encryption algorithms include SHA256, SHA512, and MD5 (though MD5 is less secure now). This doesn’t *prove* encryption but gives a clue.
- Select the file in Finder.
- Press Command + I (or right-click and choose ‘Get Info’).
- Look at the ‘General’ section for size, kind of file, and permissions. Unusual sizes or file types can be a sign.
The file command can identify file types.
file /path/to/your/file.ext
If the output says something like ‘encrypted data’ or an unusual format, it’s worth investigating further.
file CommandOpen a terminal and use the file command:
file /path/to/your/file.ext
Similar to macOS, look for output indicating ‘encrypted data’ or an unexpected file type.
stat CommandThe stat command shows detailed file information including permissions and access times. Unusual permission settings might indicate encryption.
stat /path/to/your/file.ext
- Run a full system scan with your antivirus software. Many programs can detect ransomware and other malware that encrypts files.
- Make sure your antivirus definitions are up to date.
Search your computer for files with these extensions:
- .aes
- .locky
- .crypt
- .encrypted
- .ecc
- .ransom
- Do not pay the ransom! There’s no guarantee you’ll get your files back, and it encourages criminals.
- Disconnect your computer from the internet to prevent further spread of malware.
- Report the incident to your local cyber security authorities.
- Consider restoring from a backup (if you have one). This is the best solution.