All Blogs
Ransomware, such as CryptoLocker, is based on extorting money from computer users in order to regain access to their documents. Contrary to conventional thought, business downtime is ranked as the biggest cost associated with ransomware, not the ransom itself. An outbreak such as this creates two hard choices for businesses: either spend multiple days recovering locked files from backups or pay ransom to criminals. In either scenario, businesses are likely to face major downtime that far outweighs the cost of the ransom. With such high stakes, how do you keep you and your business safe?
It’s extremely important to have a good backup system for critical files, which will help lessen the damage caused by the infection. Knowing what to look out for, however, is crucial in keeping ransomware from taking over your files in the first place. This infection is typically spread through emails that appear to be customer support related issues, like the one below:
These emails usually include a zip attachment which contains executable files disguised as PDF files and are named something like FORM_101513.exe or FORM_101513.pdf.exe. Since Microsoft does not show extensions by default, they look like normal PDF files and users often open them. Once the PDF is opened, the virus saves itself to a folder in the user’s profile and adds a key to the registry to allow it to run every time the computer starts up. It then encrypts files stored on local and network drives. The virus then displays a message offering to decrypt the data if a payment is made.
It’s easy to see why ransomware is so widespread. The emails look legitimate and urge people to take some form of action. Stay protected by being particularly wary of emails from senders you don’t know, especially those with attached files. Below is a partial list of known CryptoLocker email subjects. This list is not complete, but shows examples of what to look out for.
If you have more questions or fall victim to ransomware, please call us at 412.342.3800. Our team will answer all your questions and work with you to get you back up and running!
Sources:
http://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information#files
https://www.intermedia.net/press-release/report-identifies-ransomwares-biggest-cost-to-be-business-downtime