Forum Discussion
rwbradley
Apr 17, 2015Explorer
1492 wrote:
Many are already familiar with CryptoLocker, the insidious malware which encrypts one's personal files, then demands a ransom in Bitcoins for the key password that unlocks them. Failure to do so in a timely manner results in the ransom escalating substantially, or the unlock key being destroyed. Of course, paying the ransom was no guarantee of getting the unlock key anyway. Who would you complain to if you didn't receive it?
CryptoLocker snagged not only individual PC users, but corporations and even local Sheriff/Police departments forced to pay up to unlock their evidence files. Fortunately, the FBI/Interpol took down the CryptoLocker servers back in June 2014. But, sure enough, variants popped up almost immediately. And still a threat. Not surprisingly due to the estimated tens of millions of dollars the hackers gain from their ransomware.
Notwithstanding, most up to date AV software detects this types of ransomware. Another argument for having a real-time security package installed since several are available for free. Along with routine backups of personal data should provide adequate protection.
However, users still fall prey to this type of encryption ransomware. Many being mislead into installing the malware and allowing it to run. Among the most visible being the CoinVault ransomware.
Luckily, Kaspersky just release a tool that may be able to decrypt files infected with CoinVault codenamed NoRansom. You can find it here at noransom.kaspersky.com.
Commonsense can go a long way in preventing these types of malware from invading one's systems. Keeping system, browser, and AV software updated, along with a backup plan can also ensure that you're not contributing to these fraudsters bank account.
Excellent information, but one very important thing to remember with Backups is, for them to also not get hit by the Ransomware, it must be offline backup as most variants of the Ransomware will also hit attached network devices. If for example you have a WD My Cloud drive on your network and you setup all your computers to automatically backup across the network to it on a regular basis ie weekly, it is also vulnerable if one of your computers gets hit. A good backup plan involves two backup copies and one offline in a secure fireproof safe (or even better offsite or using a third party service like Carbonite).
With personal files, if you have a disaster like Ransomware there is a saying, "Two copies = one and one copy = none".
About RV Must Haves
Have a product you cannot live without? Share it with the community!8,804 PostsLatest Activity: Nov 02, 2025