Friday, 10 January 2014

Cryptolocker Ransomware – FAQ

What are Cryptolocker and Ransomware?

 If you haven’t heard of Cryptolocker yet, you probably soon will. It’s a particularly dangerous strain of ransomware, but with a huge difference.

Ransomware is a type of malware that tries to get victims to pay to regain control of their computer and/or files. Once it infects a computer, ransomware tells the victim that they need to pay a ransom or face not be able to use their computer again.

However once a victim works out how to remove the ransomware, they were able to carry on as normal. Not with Cryptolocker, however.

Cryptolocker goes further by actually encrypting a user’s files, preventing them from accessing them. Then, just like all ransomware, it tells the user to pay up. However, even if the user works out how to remove Cryptolocker, the files it leaves behind are still inaccessible.

Cryptolocker is essentially ransomware, but it really does stop you from accessing your files. It’s ransomware, but without the bluff.

 Can you remove Cryptolocker?

Yes. Removing Cryptolocker is as simple as removing most types of known malware. All the top antivirus companies have released tools or updates that will ensure Cryptolocker gets removed – many of which have to be run in Windows Safe Mode. Just follow the online instructions provided by your antivirus vendor to remove the infection.

But know this – removing Cryptolocker does not give you access to files that is has encrypted.

Can you recover your files after Cryptolocker infects them?

Despite what many websites claim, there really is no way to recover your files after they have been encrypted, unless you chance it with the ransom money. And that is the honest truth.

The Cryptolocker screen.

 
Back during the times of the Second World War where cryptographers would intercept coded messages from the enemy, these codes could often be broken because encryption technology was not as advanced as it is now.

However, the problem now is that encryption codes have become so strong, they simply cannot be realistically broken. The ability to encrypt a file has progressed much faster than our ability to break the encryption code. Even a brute force attack (which means constantly guessing, basically) by a supercomputer would take too long to break a strong encryption code.

And Cryptolocker uses very strong codes, so no, there really is no way to get your files back without the decryption code, and that code can only be acquired by paying the piper. Well, criminal, in this case.

Preventing Cryptolocker

Cryptolocker infects computers the same way many types of malware infects computer – that is to say there is no special, unprecedented way it gets on your computer. Opening dangerous email attachments, downloading suspicious browser extensions or plugins, or visiting less reputable websites are all common ways to become infected with Cryptolocker. Cryptolocker also uses networks of pre-infected computers (known as botnets) to help spread.

Should I pay the ransom?

You’re dealing with criminals, meaning there is no guarantee that even if you do pay, you’ll get your files back. It’s not like there is a customer service desk to call if something goes wrong. We have received report that people do indeed get their files back after paying, and also reports of people who did not.

Ultimately it’s a risk, and it is also not our call to make.

The bottom line….

Cryptolocker is one of the most aggressive malware strains that we have seen in a number of years, and its success is most likely going to fuel similar attacks in the future and spawn new, more highly evolved strains.

Thus it has never been more important to both understand how to stay safe when using the Internet and to keep your computer adequately protected from cyber threats.

Did we miss a question? Let us know in the comments below or email us.


 

1 comment: