CryptoLocker – A new variant of Trojan Ransomware has recently appeared in the world of cybercrime; but, it is not just a typical piece of RansomWare
When it infects a system it would encrypt your data using a strong cryptography and the cybercriminals will hold the users’ data hostage until a ransom is paid. The users are usually infected by an email with an attach .exe file and when opened, it will execute scripts to encrypt all the users’ data. It has been reported the ransom demands are for either $300 US dollars or Bitcoins. However, there is no guarantee the decryption of the data will occur after the ransom is paid.
CryptoLocker is spreading fast in phishing campaigns and it has been reported it can be sent as a fake delivery notification or an email from a financial institution.
According to Kaspersky’s Costin Raiu the primary target for this Trojan Ransomware is ‘US and UK, with India, Canada, Australia and France being second-tier targets’ and the National Crime Agency (NCA) in a recent BBC article said ‘Small to medium businesses seem to be the target’ and there are ‘significant risks’.
It is important to have anti-virus protection in general but with over 10,000 people falling victim to CryptoLocker within a week, it further highlights the need to have a good level of IT security in place. But this is usually not the case, as anti-virus is often considered after one becomes a victim.
From a B2B perspective it is always suggested to have a layered approach to IT security i.e. having a firewall, anti-virus, endpoint security, email security products to limit inbound email threats. From personal use perspective having anti-virus in place is essential.
Email Security products such as NetMail will help protect users’ from this type of trojan by blocking .exe files as a rule. However, CryptoLocker can also infect systems via physical media, websites etc so, anti-virus and malware detectors are essential, to help create a strong defence to keep those criminals off your devices and networks.
So be extra careful and do not open those .exe files unless you know exactly who it is from.