RANSOMWARE ENCRYPTION VIRII
Ransomware is easy to understand but hard to beat. It infects the machine, encrypts all files and then demands payment to get the files back. Ransomware works so well that most variants will even remove themselves when the damage is done, knowing you have the choice of either paying the ransomware
author to get your files back, or risk losing them forever.
Several examples of ransomware have become very well known because of their reach and cost to those infected.
CRYPTOLOCKER Renders data files unusable unless the victim pays for a key to unlock infected files. It's usually
triggered when a user downloads an attachment or clicks on a link in an email disguised to look like it's coming from a friend or a business associate.
CRYPTOWALL Incorporates data-theft malware, which allows the virus to steal potentially valuable data from infected systems, whether or not the victim pays the ransom.
TORRENTLOCKER
First appearing in August 2014, it's made from components of CryptoLocker and CryptoWall. It's typically distributed via emails that pretend to be shipping notifications, driving or speeding violations, or other corporate/government correspondence.
CRYPTOFORTRESS Making headlines in February 2015, it looks similar to TorrentLocker. It encrypts files with a 2048-bit RSA-AES encryption
routine. This type of encryption would take a standard desktop computer 6.4 quadrillion years to decrypt.
PACMAN Debuted in early 2015. It uses very convincing Dropbox links to fool victims. Its first targets were Danish chiropractors who received emails with the subject line, "Possible new patient". The email contained Dropbox links to MRI and CT scans, which launched
ransomware.
HOW DO YOU KNOW IF YOU'VE BEEN A VICTIM OF RANSOMWARE?
Your computer is infected with ransomware if you receive a popup
king to pay a specific sum of money usually in bitcoins. The ransomware will generate files on your computer similar to the following: