Orbits IT

CryptoLocker: What you should know!

Having your computer and/or drives infected by CryptoLocker is a sure-fire way to ruin your day! CryptoLocker first appeared on the web in September 2013, it is” alt=”” width=”134″ height=”136″ data-opt-src=”https://ml5fuicvpcst.i.optimole.com/8ZbZ_8w.Emt8~1d1b2/w:300/h:286/q:80/https://www.orbitsit.co.uk/wp-content/uploads/2015/07/cryptolocker-300×286.jpg” /> a ransom
ware Trojan designed to encrypt files on the infected machine, it then requests the user to pay a fee (usually in Bit Coins or by a prepaid card) to buy a unique private key to decrypt the files. The malware gives the user a deadline, unless payment is made by the stated deadline it threatens to delete the private key, ultimately making it impossible to ever decrypt the encrypted files.

In June of 2014, the United States Department of Justice announced that a consortium of software venders, universities and law enforcement agencies named “Operation Tovar” had gained access to the database that stored the private keys that the malware had been charging for. By August 2014, a Dutch security firm had used the database to create a free online service that provided infected users with their private key to decrypt the files.

After the release of the database and the identity of the creator (who the FBI has a put $3 million reward for information leading to the arrest and conviction of him), not much was heard about the malware – until recently (In fact Orbits has dealt with the malware on numerous occasions in last few weeks alone). It seems upon releasing information about the amount of money extorted by the malware, it has prompted hackers to replicate the malware and circulate it again.

 

I have an Anti-virus so I’m safe, right?

Unfortunately not, in many cases anti-virus detect the malware only after it has done it damage, sometimes anti-virus won’t detect it at all. The anti-virus software has to have that particular version on record for it to flag-up as malicious malware, instances of the malware are continually changed to avoid detection by such protective software. Although your anti-virus may not detect
this particular intrusion it is important to have one installed.

How do I avoid becoming a target?

Usually the malware is distributed an installed via email, being vigilant to what attachments you open and save is the best way to keep your computer infection free. Only open emails and attachmorbits safe” alt=”orbits-safe” width=”150″ height=”150″ data-opt-src=”https://ml5fuicvpcst.i.optimole.com/8ZbZ_8w.Emt8~1d1b2/w:150/h:150/q:80/rt:fill/g:ce/https://www.orbitsit.co.uk/wp-content/uploads/2012/11/orbits-safe.png” />ents from senders you trust etc.

The most important thing is to have backup and restore procedures in place. Should you be unfortunate enough be a victim of a malware attack you are going to want a fail-safe plan. Orbits suggest having both local and off-site backups in place as the encryption can spread through drives attached via your network. You can find out more about our backup services we provide here.

 

For more information on safeguarding yourself on the web, click here to contact us!

Follow us

A quick overview of the topics covered in this article.

Sign-up to our Byte-Sized Newsletter on LinkedIn for monthly updates, tips and tech news
Latest articles