By on October 25, 2013.
Cryptolocker malware, a new ransomware Trojan that encrypts your files and demands money to return them.
The attackers give you roughly three days to pay them, otherwise your data is gone forever.
Offer ends February 20, 2019, don't miss this Introductory Sale for acdsee Home Pack 2019.
For each new victim, another unique key is created and only the Cryptolocker authors have access to the decryption keys.For a free system check, you can use the Kaspersky Rescue Disk:.Later, the GPCode authors upgraded the RSA key to 1024 bits, putting it perhaps only in the realm of NSAs cracking power.Download the, kaspersky Rescue Disk Maker (rescue2usb.In total, weve had 2764 unique victim IPs contacting the sinkholed domains.In the past, we have witnessed similar malware like the famous GPCode that used RSA keys for encryption.
The most affected countries are the UK and US, followed by India, Canada and Australia: Its important to point out the statistics indicate the number of victims that havent had their files encrypted yet.
If they act quickly after the infection and clean their system with an anti-malware tool, then the data might not be encrypted at all.
A multitude of payment options are available, including Bitcoin: To make sure the victim gets the message, they set a pretty scary wallpaper on the infected machine: To connect to the C2 servers, Cryptolocker uses a domain generation algorithm that produces 1000 candidate unique domain.