CryptoLocker Ransomware: The Crime That Can Be Prevented by Dr. Rebecca Wynn This week I received notification from a legal firm (after the fact) who had been infected with CryptoLocker Ransomware and all of their files where encrypted and held for ransom. Since they did not have backup shorter than a week their IT staff had recommend that they pay the ransom. They ended up having to pay $400 USD to get the files decrypted. They were lucky in that the criminals actually supplied the key and provided some technical assistance in retrieving the files. Goodson’s law firm in the North Carolina state capital Charlotte, had gone public on February 8, 2014 bravely admitting losing its entire cache of legal documents to the Cryptolocker Trojan despite attempting to pay the $300 ransom in a bid to have them unscrambled. (https://goo.gl/Doidpw) Right now, the FBI thinks international criminals are behind Cryptolocker.....
Read the rest of this story with a free account.
Already have an account? Sign in
- AES
- Bitcoin
- BTC
- C2 server
- CASP
- CCISO
- CCSK
- CEH
- cissp
- CIWSA
- CIWSP
- CRISC
- CryptoLocker
- CryptoLocker Decryption Service
- CWNA
- DHL
- ECSA
- FBI
- GSEC
- HTTP
- ITILv3
- L|PT
- malware
- MBA
- MCP
- MCTS SQL Server 2005
- MoneyPak
- National Crime Agency
- NSA/CNSS NSTISSI 4011-4016
- PowerShell
- private key
- Project+
- PublicKey
- ransomware
- RSA
- RSA private key
- RSA public key
- RunOnce
- Scan Tool
- Security
- Security+ CE
- Software Restriction Policies
- SRPs
- timestamp
- VersionInfo
- windows
- Windows Safe Mode