Call us 24/7 and get a free diagnosis
Hello!
You’re about to visit our web page in Español
Would you like to continue?
If this is not what you’re looking for,
Call us 24/7 and get a free diagnosis
CryptoLocker is a ransomware specimen designed to infect Microsoft Windows computers through a Trojan.
CryptoLocker is a ransomware specimen designed to infect computers through a Trojan. It is programmed to affect Microsoft Windows systems and block access to files until a ransom is paid to the malware authors.
Once installed, CryptoLocker encrypts certain files it finds on the infected computer and displays a ransom note on the screen, demanding hundreds of dollars in bitcoin for the decryption key.
The Trojan spreads as an email attachment and through a botnet for P2P file sharing. It gets run when the victim opens the attached ZIP file by entering the password included in the message, and attempts to open the PDF it contains. CryptoLocker takes advantage of Windows’ default behavior of hiding the extension from file names to disguise the real .EXE extension of the malicious file.
Once active, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. CryptoLocker encrypts files to a strength which renders them irretrievable, leaving victims with only two options to recover access to their files: pay the ransom (with no real guarantee that making the payment will actually release the files) or restore them from backup copies.
However, the combined efforts of police forces from multiple countries has allowed the database of private keys used by CryptoLocker to be accessed. This database has been in turn used to build an online tool for recovering the keys and files without paying the ransom.
CryptoLocker only works on PCs running Windows XP, Vista, Windows 7 or Windows 8, as it is designed to exploit features included in those operating systems. It doesn't affect Apple devices, smartphones or tablets.
According to the FBI and other law enforcement agencies, the operators of CryptoLocker have successfully extorted millions of dollars in ransom payments. By the end of 2013, just a few months after being released, the malware had already infected more than 235,000 computers.
This malware spreads via email by using social engineering techniques. Follow these tips to protect yourself from CryptoLocker: