A new virus threat named CryptoLocker is a dangerous piece of - TopicsExpress



          

A new virus threat named CryptoLocker is a dangerous piece of malware that is distributed via fake emails that contain malicious attachments. This applies to Microsoft Windows based devices – at home and at work. Once Cryptolocker infects a device, it encrypts all your files, including photos, documents and spreadsheets. Cryptolocker is capable of encrypting not only files from the local hard drive, but also ones on USB drives, shared network drives and external hard drives. It can also access “Cloud” storage drives. Your files are locked out permanently unless a ransom is paid. Currently the criminals are demanding 2 “Bit Coins”, a virtual Internet currency. Two Bit Coins currently cost £536. A splash screen is displayed with a countdown clock. You have just 96 hours to pay the ransom. After that the unlock key is deleted. Various reports say that the criminals are giving out the decryption key on payment of the ransom. Reports also suggest that the criminals will provide the decryption key up to ten days after the deadline, but the ransom demand is then increased tenfold. How to avoid Cryptolocker Be suspicious of all attachments in emails - CryptoLocker appears to have been spreading through fake emails, designed to mimic the look of legitimate businesses, in particular fake FedEx and UPS tracking notices. Never open an email attachment that you are not expecting. If in doubt contact the sender to check that the attachment is real. Don’t take a chance. This advice also applies to “Links” in emails. Don’t click if not absolutely sure. Anti virus programs - Make sure that you have quality Anti Virus systems installed. Unfortunately the malware is constantly being changed so Anti virus suppliers are playing catch up all the time. Stopping it that way is not guaranteed. Backups – always backup all your files onto a separate USB hard drive - but do not leave it plugged in unless backing up. Keep it away from your computer, preferably at another location altogether. Alternatively backup to DVDs and keep them off premises (it is sensible to use both a hard drive and DVDs). Then, if Cryptolocker strikes, you can simply restore your files and photos. How to get rid of Cryptolocker - It is very easy to get rid of Cryptolocker from a computer, though it does involve editing the system Registry and removing a couple of entries. Unfortunately that does not decrypt your files. To reinstate your files simply restore your backup. If you do not have a backup then the blunt choice is to lose your files or pay the ransom. This is a very nasty, highly criminal malware attack.
Posted on: Wed, 20 Nov 2013 20:38:13 +0000

Trending Topics



Recently Viewed Topics




© 2015