The Lord & Griffin IT Solutions “Year in Review” brings you the top stories, trends, and tech news of 2013.
Month: December 2013
A specific breed of Ransomware known as CryptoLocker has been making the rounds the last few weeks. Ransomware comprises a class of malware which restricts access to the computer system that it infects, and demands a ransom paid to the creator of the malware in order for the restriction to be removed. Some forms of ransomware encrypt files on the system’s hard drive (cryptoviral extortion), while some may simply lock the system and display messages intended to coax the user into paying. [Ransomware (malware)- Wikipedia- http://en.wikipedia.org/wiki/Ransomware_%28malware%29%5D
CrytoLocker [malware] uses social media or email as attack agents, and usually disguises itself as a FedEx, UPS, etc.. message with a tracking notice. This is usually enough bait to entice victims, especially for a business who ships things using these carriers, and Online shoppers. It looks legit and they open it, Cryto-Locked (Exe = Infected).
CryptoLocker is the sort of threat that can seriously ruin your business day or even your business, severely. Depending on the data and how important the data on your computer is.
Paying the Ransom
Paying the ransom isn’t a safe thing to do and it’s no guarantee that your data will be recovered. If the deadline passes or you lose the original program you can pay ten Bitcoins ($2200) and still recover your data. You upload a file that is encrypted and then pay the ransom. Each time someone does this it is only going to fuel more of these attacks.
Five Tips For Keeping Safe Against CryptoLocker
- Keep regular backups of your important files. If you can, store your backups offline, for example in a safe-deposit box, where they can’t be affected in the event of an attack on your active files. Your backups will be rendered useless if they are scrambled by CryptoLocker along with the primary copies of the files.
- Use an anti-virus, and keep it up to date. As far as we can see, many of the current victims of CryptoLocker were already infected with malware that they could have removed some time ago, thus preventing not only the CryptoLocker attack, but also any of the damage done by that earlier malware.
- Keep your operating system and software up to date with patches. This lessens the chance of malware sneaking onto your computer unnoticed through security holes. The CryptoLocker authors didn’t need to use fancy intrusion techniques in their malware because they used other malware, that had already broken in, to open the door for them.
- Review the access control settings on any network shares you have, whether at home or at work. Don’t grant yourself or anyone else write access to files that you only need to read. Don’t grant yourself any access at all to files that you don’t need to see – that stops malware seeing and stealing them, too.
- Don’t give administrative privileges to your user accounts. Privileged accounts can “reach out” much further and more destructively both on your own hard disk and across the network. Malware that runs as administrator can do much more damage, and be much harder to get rid of, than malware running as a regular user.
CryptoLocker virus is a series of ransomware infections that we have recently classified as extremely dangerous and recommend removing immediately. If you feel you have been infected with the CrytoLocker virus, Call Us Today! 888-404-8282 for FREE Assessment and CrytoLocker Removal.
Lord & Griffin IT Solutions is an all-inclusive IT and Web solutions Company. We can help you design, implement, optimize, manage and run your network infrastructure, regardless of its complexity and of your organization’s size. Fast, affordable business computer service and technical computer help – offering same day, weekend and evening appointments. Let us be your IT department for a fraction of the cost! For FREE Consultation Contact Us Today! 888-404-8282
CryptoLocker Ransomware Information Guide and FAQ
Proper Care & Feeding of your CryptoLocker Infection: A rundown on what we know.
Disk encrypting Cryptolocker malware demands $300 to decrypt your files