Cryptolocker’s Virus Fresh Legs
When the CryptoLocker ransomware virus first appeared in September, few IT experts expected it to stick around for so long. But in 2014, the ransomware, which generally appears as a .ZIP, .PDF, or .EXE file attached to an unfamiliar email, is still infecting computers at an alarming rate, according to a Dell SecureWorks analysis. A University of Kent survey released in March revealed that 1 in 30 users have been hit by the virus — and 40% of those had paid the ransom.Once CryptoLocker infects a machine, it encrypts all accessible files and attempts to extract hundreds or even thousands of dollars in payment to de-encrypt them. .Many IT service providers admitted that computer users who didn’t have sufficient backup and disaster recovery systems like RCSTechnology Solutions, LLC probably would have to “pay up” to recover their CryptoLocker Virus affected files. But security officials deplored the practice, saying it would only encourage Bitcoin’s continued use as ransom. “If even a few victims pay, then the cybercriminals will think they have got a viable business model and keep infecting people and asking for ransoms,” Dmitri Bestuzhev, a spokesman for anti-virus behemoth Kaspersky, told The Guardian in 2013. “If nobody pays, they will stop these campaigns.”For now, here are 5 steps to avoid CryptoLocker Virus infection:• Implement regular, remote backups and a sound disaster recovery plan• Never open ANY attachment from ANY sender you don’t recognize
• Validate ANY link in ANY unfamiliar email before clicking by hovering over it and looking for legitimate IP addresses, not long strings of unrelated characters
• Ensure that solid firewall, anti-virus, anti-spam, and malware programs are in place
• Have a trusted IT professional assess the security of your systems
CryptoLocker is one of the most devastating viruses to appear in recent years. If you want to enjoy unparalleled levels of protection, RCS Technology Solutions, LLC and put our backup, disaster recovery, system monitoring, and encryption tools to work for you.