Warning From My IT Expert! CryptoLocker: A particularly - TopicsExpress



          

Warning From My IT Expert! CryptoLocker: A particularly pernicious virus By Susan Bradley on October 24, 2013 in Top Story Online attackers are using encryption to lock up our files and demand a ransom — and AV software probably won’t protect you. Here are ways to defend yourself from CryptoLocker — pass this information along to friends, family, and business associates. Forgive me if I sound a bit like those bogus virus warnings proclaiming, “You have the worst virus ever!!” But there’s a new threat to our data that we need to take seriously. It’s already hit many consumers and small businesses. Called CryptoLocker, this infection shows up in two ways. First, you see a red banner on your computer system, warning that your files are now encrypted — and if you send money to a given email address, access to your files will be restored to you. The other sign you’ve been hit: you can no longer open Office files, database files, and most other common documents on your system. When you try to do so, you get another warning, such as “Excel cannot open the file [filename] because the file format or file extension is not valid,” as stated on a TechNet MS Excel Support Team blog. As noted in a Reddit comment, CryptoLocker goes after dozens of file types such as .doc, .xls, .ppt, .pst, .dwg, .rtf, .dbf, .psd, .raw, and .pdf. CryptoLocker attacks typically come in three ways: 1) Via an email attachment. For example, you receive an email from a shipping company you do business with. Attached to the email is a .zip file. Opening the attachment launches a virus that finds and encrypts all files you have access to — including those located on any attached drives or mapped network drives. 2) You browse a malicious website that exploits vulnerabilities in an out-of-date version of Java. 3) Most recently, you’re tricked into downloading a malicious video driver or codec file. There are no patches to undo CryptoLocker and, as yet, there’s no clean-up tool — the only sure way to get your files back is to restore them from a backup. Some users have paid the ransom and, surprisingly, were given the keys to their data. (Not completely surprising; returning encrypted files to their owners might encourage others to pay the ransom.) This is, obviously, a risky option. But if it’s the only way you might get your data restored, use a prepaid debit card — not your personal credit card. You don’t want to add the insult of identity theft to the injury of data loss. In this case, your best defense is prevention Keep in mind that antivirus software probably won’t prevent a CryptoLocker infection. In every case I’m aware of, the PC owner had an up-to-date AV application installed. Moreover, running Windows without admin rights does not stop or limit this virus. It uses social engineering techniques — and a good bit of fear, uncertainty, and doubt — to trick users into clicking a malicious download or opening a bogus attachment.
Posted on: Tue, 05 Nov 2013 23:04:19 +0000

Trending Topics



Recently Viewed Topics




© 2015