What are
Cryptolocker and Ransomware?
If you haven’t heard of Cryptolocker yet, you probably
soon will. It’s a particularly dangerous strain of ransomware, but with a huge
difference.
Ransomware is a type of malware that tries to get victims
to pay to regain control of their computer and/or files. Once it infects a
computer, ransomware tells the victim that they need to pay a ransom or face not
be able to use their computer again.
However once a victim works out how to remove the
ransomware, they were able to carry on as normal. Not with Cryptolocker,
however.
Cryptolocker goes further by actually encrypting a user’s
files, preventing them from accessing them. Then, just like all ransomware, it
tells the user to pay up. However, even if the user works out how to remove
Cryptolocker, the files it leaves behind are still inaccessible.
Cryptolocker is essentially ransomware, but it really
does stop you from accessing your files. It’s ransomware, but without the
bluff.
Can you remove
Cryptolocker?
Yes. Removing Cryptolocker is as simple as removing most
types of known malware. All the top antivirus companies have released tools or
updates that will ensure Cryptolocker gets removed – many of which have to be
run in Windows Safe Mode. Just follow the online instructions provided by your
antivirus vendor to remove the infection.
But know this – removing Cryptolocker does not give you
access to files that is has encrypted.
Can you recover
your files after Cryptolocker infects them?
Despite what many websites claim, there really is no way
to recover your files after they have been encrypted, unless you chance it with
the ransom money. And that is the honest truth.
Back during the times of the Second World War where
cryptographers would intercept coded messages from the enemy, these codes could
often be broken because encryption technology was not as advanced as it is now.
However, the problem now is that encryption codes have
become so strong, they simply cannot be realistically broken. The ability to
encrypt a file has progressed much faster than our ability to break the
encryption code. Even a brute force attack (which means constantly guessing,
basically) by a supercomputer would take too long to break a strong encryption
code.
And Cryptolocker uses very strong codes, so no, there
really is no way to get your files back without the decryption code, and that code
can only be acquired by paying the piper. Well, criminal, in this case.
Preventing
Cryptolocker
Cryptolocker infects computers the same way many types of
malware infects computer – that is to say there is no special, unprecedented
way it gets on your computer. Opening dangerous email attachments, downloading suspicious
browser extensions or plugins, or visiting less reputable websites are all
common ways to become infected with Cryptolocker. Cryptolocker also uses
networks of pre-infected computers (known as botnets) to help spread.
Should I pay the
ransom?
You’re dealing with criminals, meaning there is no guarantee
that even if you do pay, you’ll get your files back. It’s not like there is a
customer service desk to call if something goes wrong. We have received report
that people do indeed get their files back after paying, and also reports of
people who did not.
Ultimately it’s a risk, and it is also not our call to
make.
The bottom line….
Cryptolocker is one of the most aggressive malware
strains that we have seen in a number of years, and its success is most likely
going to fuel similar attacks in the future and spawn new, more highly evolved
strains.
Thus it has never been more important to both understand
how to stay safe when using the Internet and to keep your computer adequately
protected from cyber threats.
Did we miss a question? Let us know in the comments below
or email us.