![]() ![]() ![]() Many antivirus programs can remove this Trojan, but are unable to decrypt your data. Then, a warning will pop up indicating that you have been infected and showing a countdown timer until all your data is destroyed. Typically, you will see nothing wrong with your computer until all files have been encrypted. In addition to malicious email attachments, this malware may also come from websites that prompt you download a plug-in or video player. Because the program is a Trojan, it cannot self-replicate, meaning it must be downloaded to infect your computer. Once opened, the attachment creates a window and activates a downloader, which infects your computer. Although the attachments often appear to be familiar file types such as *.doc or *.pdf, they in fact contain a double extension - a hidden executable (*.exe). The most common method of infection is via emails with unknown attachments. ![]() The Cryptolocker virus will display warning screens indicating that your data will be destroyed if you do not pay a ransom to obtain the private key. Hackers encrypt your data using the public key, but it can only be decrypted using the unique private key they hold. This method relies on two "keys," one public and one private. Once your desktop or laptop is infected, files are "locked" using what's known as asymmetric encryption. Only computers running a version of Windows are susceptible to Cryptolocker the Trojan does not target Macs. In addition, the malware seeks out files and folders you store in the cloud. This includes anything on your hard drives and all connected media - for example, USB memory sticks or any shared network drives. It is a Trojan horse that infects your computer and then searches for files to encrypt. Cryptolocker is a malware threat that gained notoriety over the last years. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |