Cryptolocker: Don't be a Victim!
One of the most frightening forms of malware is ransomware. Ransomware
infiltrates your computer, typically encrypting the files on your machine or locking
your machine completely. The creator will demand that you pay a certain dollar
amount to regain access and control of your machine. Obviously, receiving control
again is never guaranteed since you can’t truly trust a criminal.
In January of this year, a new type of ransomware,
Cryptolocker, began infecting machines. The malware gains access to your
computer and then wraps all accessible files in an encryption so that the
victim cannot access them. A message appears on the screen demanding payment
within three days to unlock the encrypted files. If the payment is not received
within the timeframe, your files will be lost forever! Cryptolocker criminals,
unlike most ransomware criminals, do however seem to have a good reputation of restoring
your files after the ransom has been paid. This doesn’t mean you couldn’t be a
victim again though at a later time.
The new Cryptolocker malware has proven cybercriminals to be
clever capitalists. Initially, cybercriminals were demanding $100, but after
finding the public is willing to spend even more for the decryption of their
files, the ransom price has gone up! Now, you’ll have to pay $300 within the
given three day timeframe if you ever want to see your files again! Over the
past few months, the Cryptolocker criminals have begun to realize that some of
their victims would rather lose their computer files than allow the criminal to
access their bank account or credit card information in order to pay the ransom.
In response to a potential loss in revenue, the cybercriminals have begun
accepting payment in the form of bitcoins, a form of online payment that allows
the victim to pay safely via an unknown origin. This savvy business decision
has led to a boom in business for the cybercriminals!
As frightening as this is, you can take certain precautions
to protect yourself from the threat of ransomware. Make sure your operating
system and computer software are up-to-date. Use anti-malware software that is
up-to-date. Never click on or download material from suspicious sources or
sources you do not trust. Lastly, back up your files regularly. That way, if
your machine does get infected with ransomware, you have a fairly recent
version of your files that you can use to restore your machine.
Matthews, Lee. Cryptolocker
malware now accepts ransom payments in Bitcoins. Geek.com, 18 Oct. 2013.
Web. 21 Oct. 2013. <http://www.geek.com/apps/cryptolocker-malware-now-accepts-ransom-payments-in-bitcoins-1574298/>
Matthews, Lee. Disk
encryptiiing Cryptolocker malware demands $300 to decrypt your files. Geek.com,
11 Sept. 2013. Web. 20 Oct. 2013. <http://www.geek.com/apps/disk-encryptiing-cryptolocker-malware-demands-300-to-decrypt-your-files-1570402/>
Goodin, Dan. You’re
infected – if you want to see your data again, pay us $300 in Bitcoins. Arstechnica.com,
17 Oct. 2013. <http://arstechnica.com/security/2013/10/youre-infected-if-you-want-to-see-your-data-again-pay-us-300-in-bitcoins/>
Each day there are more sophisticated viruses, malwares, etc. that can affect our computers. For that reason, we have to be more careful about the things that we download, not open emails from strangers, not enter to web pages that look suspicious and have a good antivirus, are some things that we need to do to prevent our computer from being infected. After read this blog, I am surprised about how cryptolocker criminals have developed a new malware to create an illegal way of obtaining money from the computer owner and how easy we can lose the control of our files.
ReplyDeleteAbsolutely! Almost makes you want to go back to using pen and paper, reading physical books, and sending snail mail! Convenience, speed, and being connected to the world definitely come with a price!
ReplyDeletethis is Capitalist at his best or worst? hard to tell. But it is being a thief and a coward by holding people up without a mean for them of defending themselves. There must be a way to track those bit coins used for criminal activities.
ReplyDelete