SHARE
Facebook X Pinterest WhatsApp

CryptoLocker Ransomware Takes Your Files Hostage

No Treats: Beware Haunted Hacking Tricks Ransomware isn’t new. In fact, a little over a year ago, I wrote a blog post that discussed the rise in ransomware and a particular type of malware that the FBI released a warning about. Ransomware is a malicious program that, when run on your computer, will hold your […]

Written By
SP
Sue Poremba
Oct 31, 2013
Slide Show

No Treats: Beware Haunted Hacking Tricks

Ransomware isn’t new. In fact, a little over a year ago, I wrote a blog post that discussed the rise in ransomware and a particular type of malware that the FBI released a warning about.

Ransomware is a malicious program that, when run on your computer, will hold your files or maybe even your entire disk drive hostage until money is paid to unlock it. A new type of ransomware attack now makes past programs look like child’s play. Called CryptoLocker, this particular ransomware Trojan holds your files hostage and if you don’t pay up, your files are gone—likely for good.

What makes CryptoLocker different is how it uses encryption. As Costin Raiu from Kaspersky Lab explained in a SecureList post:

Cryptolocker uses a solid encryption scheme as well, which so far appears uncrackable. For each victim, it connects to its command-and-control (C2) to download an RSA public key that is used to encrypt the data. For each new victim, another unique key is created and only the Cryptolocker authors have access to the decryption keys.

A friend of mine recently had a computer hit with CryptoLocker, and rather than give the hackers what they wanted (payment for the key to unencrypt the files), she just accepted the files as lost forever. I think it is unlikely that most of us could afford to let that happen on our personal computer, but can you imagine the disaster if CryptoLocker hit a business computer? Does your organization have a disaster plan in place for dealing with ransomware?

If you think that your files are safe because you’ve backed them up in the cloud, the folks at Lancope warn that might not be the case:

Keep in mind that if you use a service like Google Drive, Dropbox or even SkyDrive, you have a mirror of your files in the cloud, and if the ransomware encrypts your local files, it will trigger the mirror process and the files in the cloud will also be encrypted. Some services like Dropbox have a Packrat feature that allows you to restore to any previous version of the file, which can help in a situation like this.

What’s the scariest part of CryptoLocker? AV and other security software solutions haven’t been able to catch it before it does damage. The malware is hidden in phishing email, and according to a Computerworld article, the best way to prevent CryptoLocker from loading on to your computer is a software restriction policy.

In the meantime, the best thing you can do is back up your files to a secure drive and stay vigilant against phishing attacks. And don’t ever download anything without verifying that it is safe.

Now, I’m off to back up my own computer.

SP

Sue Poremba is freelance writer based on Central PA. She's been writing about cybersecurity and technology trends since 2008.

Recommended for you...

Top Secure Access Service Edge (SASE) Solutions
Aminu Abdullahi
Aug 22, 2022
Best Data Loss Prevention (DLP) Tools
Aminu Abdullahi
Aug 19, 2022
Data Lake Governance & Security Issues
Chad Kime
Aug 18, 2022
IT Business Edge Logo

The go-to resource for IT professionals from all corners of the tech world looking for cutting edge technology solutions that solve their unique business challenges. We aim to help these professionals grow their knowledge base and authority in their field with the top news and trends in the technology space.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.