Unlike most malware, ransomware is not stealthy. It's loud and obnoxious, and if you've been infected, the attackers will tell you so in no uncertain terms. After all, they want to be paid.\u201cYour personal files are encrypted,\u201d the message on the computer blares. \u201cYour documents photos, databases, and other important files have been encrypted with strongest encryption and unique key, generated for this computer.\u201d While the language may vary, the gist is the same: If you don\u2019t pay the ransom -- typically within 48 to 72 hours -- your files are hosed.Or are they? There is a slim possibility the perpetrators may be trying to fake you out and the files haven\u2019t been encrypted. While not a common scenario, it does happen, according to industry experts. Rather than paying up, you can bypass the scary fake message and move on with your day.\u201cThere are a number of examples where true encryption doesn\u2019t occur. Instead, cyber criminals rely on the social engineering edge of the attack to convince people to pay,\u201d warns Grayson Milbourne, director of security intelligence at Webroot.Is it real or fake?It takes only a few seconds to confirm whether it\u2019s a real infection or a social engineering scam.If the ransom demand includes the name of the ransomware, then there\u2019s no mystery, and you're in trouble. Ransomware families that identify themselves include Linux.Encoder -- the first Linux-based ransomware -- which clearly says \u201cEncrypted by Linux.Encoder.\u201d CoinVault identifies itself by listing the support email address. TeslaCrypt and CTB-Locker are also among the well-known ransomware families that tell you who is holding your files hostage.But there are plenty of ransom plays that don\u2019t bother with names. For example, CryptoLocker simply warned that your files have been encrypted and never flaunted its name. Instead, you'll have to look for other clues: Is there a support email address? Search the Internet for the bitcoin payment address or the actual ransom message and see what comes up on forums or from security researchers. \u00a0If you can't identify the ransomware, then there's a chance it could be fake. In such cases, your files aren't actually encrypted; the attacker simply pops up a scary message and locks the screen. The ransom demand typically shows up inside a browser window and doesn\u2019t let the user navigate away, or it locks the screen and displays a dialog box asking for an encryption key. Because the victim can\u2019t close the message, it looks real.If it\u2019s possible to close out of the screen using key commands, such as Alt-F4 on Windows and Command-W on Mac OS X, then the ransom demand is fake. Or try force-restarting the device and see if the message goes away.Ransomware tends to change the filename as part of the encryption process. Locky adds a .lock file extension to all documents, while CryptXXX uses the .crypt file extension. Look through the files and see which files have been modified. See if you can still open them or if you can change the file extensions back and open the files. Sometimes, the file extensions have been changed without actually encrypting the files.Get back into the system using a Linux Live CD and search the system to see if the actual files have been moved or renamed. Most modern operating systems can search the contents of the file along with filenames.Don\u2019t get your hopes too highWhile it\u2019s good to be skeptical, if you see a ransom demand, it's probably legitimate. Thanks to crimeware kits preloaded with ransomware and ransomware as a service, the barrier to entry is much lower. Script kiddies and other less technically inclined criminals are trying to piggyback on the success of real ransomware gangs without putting in the work.\u201cThe simplicity of buying your crypto-malware from a crime-as-a-service provider now means cyber criminals can easily deploy a ransomware attack that uses complex and effective encryption against their targets,\u201d says Mimecast\u2019s cyber security strategist, Orlando Scott-Cowley.Ransomware infections are a serious threat and fake attacks are relatively rare. But before you start the process of rebuilding your machine to recover from a ransomware infection, make sure you aren\u2019t being scammed. It takes only a few minutes.If it turns out you've been victimized by the real thing, you may have another slim chance: publicly available decryption tools.