Ty Burna
Getting Noticed By Management
I'm writing this post to warn everyone to be careful in regards to a new strain of malware/ransomware that has popped up in the past couple months.
This is an ugly infection, and it's spreading rapidly. Essentially what this infection does once it gets onto your computer is encrypt your data, making it unavailable. The virus then pops up a message saying you have so many hours to pay up to decrypt your data or the key to unlocking the encryption will be destroyed as seen here:
This is no joke, this isn't your typical malware that merely tries to scare you into paying up to remove the virus. It legitimately will lock you out of your data until you pay up. There has been no way to reverse the encryption at this point and time. Most antivirus companies have now implemented definition updates to prevent the Cryptolocker malware from infecting your machine, but remember that no AV Software is 100% effective.
If you are the victim of this malware, you have essentially only a couple options. Pony up the $300 they are requesting and have your data decrypted, or if you do not have any pertinent data or have it backed up, you may run your standard malware scans to remove the virus, however I do warn that once you do there is no way to pay for the decryption process other than going onto a website the creators of the virus have set up and pay for it there. Unfortunately going that route also includes a massive spike in cost as they now request $2,100 to decrypt your data. It has been confirmed through what I have read from other users in the Reddit thread regarding Cryptolocker that paying for the decryption does work, and the virus removes itself afterwards as well.
There has been reports that restoring from shadow copies can bring the data back without paying for it, however it is not a guarantee. One thing I will recommend and cannot stress enough, always back up any important data, whether to the cloud via Google Drive or Dropbox, or to an external hard drive. With the advent of this new type of infections, there is no doubt that variants and new strains will pop up. This malware will infect any attached drives, meaning if you leave your USB External Hard Drive connected to your PC at all times, this will encrypt the contents of that drive as well, rendering your backups useless. This is also true if you have the Dropbox desktop application as Windows treats it as just another folder. Networked drives I believe can be harmed as well.
Again, AV companies are getting preventative measures in place against the malware, but again, take all necessary precautions. Be diligent with email attachments, make sure it is from a person you know. If you are unsure, merely delete the email and contact the person that sent it. Avoid any websites out of the ordinary, and make sure your anti virus program is up to date. If you do not have one, Malwarebytes does have a pro version that will prevent infections such as Cryptolocker from harming your PC.
Any questions or comments I'd be glad to help as much as I can.
This is an ugly infection, and it's spreading rapidly. Essentially what this infection does once it gets onto your computer is encrypt your data, making it unavailable. The virus then pops up a message saying you have so many hours to pay up to decrypt your data or the key to unlocking the encryption will be destroyed as seen here:

This is no joke, this isn't your typical malware that merely tries to scare you into paying up to remove the virus. It legitimately will lock you out of your data until you pay up. There has been no way to reverse the encryption at this point and time. Most antivirus companies have now implemented definition updates to prevent the Cryptolocker malware from infecting your machine, but remember that no AV Software is 100% effective.
If you are the victim of this malware, you have essentially only a couple options. Pony up the $300 they are requesting and have your data decrypted, or if you do not have any pertinent data or have it backed up, you may run your standard malware scans to remove the virus, however I do warn that once you do there is no way to pay for the decryption process other than going onto a website the creators of the virus have set up and pay for it there. Unfortunately going that route also includes a massive spike in cost as they now request $2,100 to decrypt your data. It has been confirmed through what I have read from other users in the Reddit thread regarding Cryptolocker that paying for the decryption does work, and the virus removes itself afterwards as well.
There has been reports that restoring from shadow copies can bring the data back without paying for it, however it is not a guarantee. One thing I will recommend and cannot stress enough, always back up any important data, whether to the cloud via Google Drive or Dropbox, or to an external hard drive. With the advent of this new type of infections, there is no doubt that variants and new strains will pop up. This malware will infect any attached drives, meaning if you leave your USB External Hard Drive connected to your PC at all times, this will encrypt the contents of that drive as well, rendering your backups useless. This is also true if you have the Dropbox desktop application as Windows treats it as just another folder. Networked drives I believe can be harmed as well.
Again, AV companies are getting preventative measures in place against the malware, but again, take all necessary precautions. Be diligent with email attachments, make sure it is from a person you know. If you are unsure, merely delete the email and contact the person that sent it. Avoid any websites out of the ordinary, and make sure your anti virus program is up to date. If you do not have one, Malwarebytes does have a pro version that will prevent infections such as Cryptolocker from harming your PC.
Any questions or comments I'd be glad to help as much as I can.