Have you heard about a new malware named CryptoLocker?
CryptoLocker is a nasty Ransomware male-ware which is targeting computers running the Microsoft Windows operating system. CryptoLocker disguises itself as a legitimate email attachment.
Once your computer is infected, it encrypts all your files on your computer, then when it is done it will start targeting the network drives too.
Then you have one option to get back your file - Pay up or lose your data.
The kidnappers (The Hackers behind the virus) started asking for 100USD or 100EUR. But in my opinion they found out that people are willing to pay more to get their files back so now your computer will be locked up and then you will be asked to make a ransom payment. The payment is ranged between $100 and $700 or 2 bitcoins, to get your files back.
They even lunched a decryption service platform to facilitate the payment. The service is available on http://93.189.44.187/
The reason why the hackers has launched the Decryption Service is because the antivirus companies are on red alert about CryptoLocker maleware and they have released updates for their users, that can detect and remove the infection or the registry keys from the system which is actually required to pay the ransom and decryption process. So if malwar will get deleted, neither victim will the decryption keys ever, neithj the criminal will get paid for it.
The decryption service works by uploading one of the encrypted files to the mentioned website (which is acting as Customer Service for the victims) then you will get an order number.
It will then prompt the user to buy the private key by paying 10 Bitcoins or approximately $2,200 USD.
Once the payment is made, the website will allow the user to download the decryption private key and a decrypter tool that can be used to decrypt all CryptoLocker encrypted files on the system.
Interesting enough, if you already paid the ransom amount, you will be provided with the private key every time you go to their website and enter your order number. At the end they want their "customers" I mean victims happy.
CryptoLocker has been already spreading in Europe, Middle East, North America and Asia Pacific. Almost 65% of the victims are in the US.
Once you are hit with CryptoLocker there is no tool that can decrypt your files. Even if you updated your antivirus and cleaned your computer from the virus itself, your files are gone forever. Unless you have a backup on an external drive that was not connected to your computer when your computer got infected.
If you have no backup then not much of an option here. You either pay the kidnappers (do you really trust them not to do it again or ask for more money?) or you forget about your files.
Therefore, if you are reading this now and you are not a victim. Please make sure you do a backup right after you finish reading this article and make sure it is not connected to your computer or to the network.
Bitdefender (The Antivirus Firm) has just released a tool to protect your files from CryptoLocker. You can Download Anti-CryptoLocker here
CryptoLocker is a nasty Ransomware male-ware which is targeting computers running the Microsoft Windows operating system. CryptoLocker disguises itself as a legitimate email attachment.
Once your computer is infected, it encrypts all your files on your computer, then when it is done it will start targeting the network drives too.
Then you have one option to get back your file - Pay up or lose your data.
The kidnappers (The Hackers behind the virus) started asking for 100USD or 100EUR. But in my opinion they found out that people are willing to pay more to get their files back so now your computer will be locked up and then you will be asked to make a ransom payment. The payment is ranged between $100 and $700 or 2 bitcoins, to get your files back.
They even lunched a decryption service platform to facilitate the payment. The service is available on http://93.189.44.187/
The reason why the hackers has launched the Decryption Service is because the antivirus companies are on red alert about CryptoLocker maleware and they have released updates for their users, that can detect and remove the infection or the registry keys from the system which is actually required to pay the ransom and decryption process. So if malwar will get deleted, neither victim will the decryption keys ever, neithj the criminal will get paid for it.
The decryption service works by uploading one of the encrypted files to the mentioned website (which is acting as Customer Service for the victims) then you will get an order number.
It will then prompt the user to buy the private key by paying 10 Bitcoins or approximately $2,200 USD.
Once the payment is made, the website will allow the user to download the decryption private key and a decrypter tool that can be used to decrypt all CryptoLocker encrypted files on the system.
Interesting enough, if you already paid the ransom amount, you will be provided with the private key every time you go to their website and enter your order number. At the end they want their "customers" I mean victims happy.
CryptoLocker has been already spreading in Europe, Middle East, North America and Asia Pacific. Almost 65% of the victims are in the US.
Once you are hit with CryptoLocker there is no tool that can decrypt your files. Even if you updated your antivirus and cleaned your computer from the virus itself, your files are gone forever. Unless you have a backup on an external drive that was not connected to your computer when your computer got infected.
If you have no backup then not much of an option here. You either pay the kidnappers (do you really trust them not to do it again or ask for more money?) or you forget about your files.
Therefore, if you are reading this now and you are not a victim. Please make sure you do a backup right after you finish reading this article and make sure it is not connected to your computer or to the network.
Bitdefender (The Antivirus Firm) has just released a tool to protect your files from CryptoLocker. You can Download Anti-CryptoLocker here