โApr-17-2015 12:41 PM
โApr-17-2015 03:55 PM
โApr-17-2015 01:34 PM
1492 wrote:
Many are already familiar with CryptoLocker, the insidious malware which encrypts one's personal files, then demands a ransom in Bitcoins for the key password that unlocks them. Failure to do so in a timely manner results in the ransom escalating substantially, or the unlock key being destroyed. Of course, paying the ransom was no guarantee of getting the unlock key anyway. Who would you complain to if you didn't receive it?
CryptoLocker snagged not only individual PC users, but corporations and even local Sheriff/Police departments forced to pay up to unlock their evidence files. Fortunately, the FBI/Interpol took down the CryptoLocker servers back in June 2014. But, sure enough, variants popped up almost immediately. And still a threat. Not surprisingly due to the estimated tens of millions of dollars the hackers gain from their ransomware.
Notwithstanding, most up to date AV software detects this types of ransomware. Another argument for having a real-time security package installed since several are available for free. Along with routine backups of personal data should provide adequate protection.
However, users still fall prey to this type of encryption ransomware. Many being mislead into installing the malware and allowing it to run. Among the most visible being the CoinVault ransomware.
Luckily, Kaspersky just release a tool that may be able to decrypt files infected with CoinVault codenamed NoRansom. You can find it here at noransom.kaspersky.com.
Commonsense can go a long way in preventing these types of malware from invading one's systems. Keeping system, browser, and AV software updated, along with a backup plan can also ensure that you're not contributing to these fraudsters bank account.
โApr-17-2015 01:12 PM
โApr-17-2015 12:56 PM