CryptoLocker is Trojan horse malware which surfaced in late 2013, a form of ransomware targeting computers running Microsoft Windows. CryptoLocker disguises itself as a legitimate attachment; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid voucher) is made by a stated deadline, and says that the private key will be deleted and unavailable for recovery if the deadline passes. If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware’s operators, for a significantly higher price in Bitcoin. Although CryptoLocker itself is readily removed, files remain encrypted in a way which researchers have considered infeasible to break, with some suggesting paying the ransom as the only effective way to recover files that had not been backed up.
How To Protect Yourself
- First – backup your system! right away! Either locally using an external drive (then unplug from your system) or using an online service like crashplan.com
- Second – make sure you are backed up – if you get infected it could cost you hundreds to get your data back or it might be gone forever
- install malwarebytes anti-malware free by using this link –> http://ninite.com/malwarebytes/ninite.exe –> download the file and run it, it will auto install the program. Then go the “protection” tab and activate the trial. We suggest buying the full version of this software
- Install this program http://moonrivers.com/files/
cryptorevent.exe–> download –> run –> hit OK –> hit apply and then reboot –> This one is simple and easy
- Contact us at www.moonrivers.com/help if you need assistance or email firstname.lastname@example.org