CryptoLocker - A Dangerous Malware That Locks Your Files for Ransom
Would you share this Article with others? +
This is how the CryptoLocker looks:
Your personal files are encrypted!
Your important files encryption produced on this computer: photos, videos, documents, etc. Here is a complete list of encrypted files, and you can personally verify this.
Encryption was produced using a unique public key RS-2048 generated for this computer.to decrypt files you need to obtain the private key.
The single copy of the private key, which will allow you to decrypt the files, located on a secret server on the internet; the server will destroy the key after a time specified in this window,. After that, nobody and never will be able to restore files.
To obtain the private key for this computer, which will automatically decrypt files, you need to pay 100 USD / 100 EUR / similar amount in another currency.
Click <Next> to select the method of payment and the currency.
Any attempts to remove or damage this software will lead to the immediate destruction of the private key by the server.
If your computer becomes infected with this malicious program, the window with the message above will be displayed on your computer screen. What this malicious computer program does, is to make all your important files, which includes documents, videos and photos on your computer, inaccessible or unreadable by encrypting them with a very powerful encryption technology.
The only way to decrypt or make these file readable again, is to get the private key. Without the private key, your files that were encrypted by this nasty computer program will be lost forever.
This malicious computer program also has a ticking count-down clock that will destroy the private key when it reaches zero. Now, once the private key is destroyed or loss, you will not be able to recover your encrypted files.
Should you pay the ransom money to these cybercriminals who have created this malicious program, so that your files can be recovered?
This is a difficult question, because there is no guarantee that you will receive the private key after you have made the payment. So, you may end up losing your files and money. Some persons have claimed that they received the private key after making payment. But, others have claimed that they didn’t receive a private key and I have lost all their files.
How do I prevent something like this from happening?
Please ensure that you have antivirus software installed on your computer and it is updated regularly. Also, ensure that you make a backup copy of your files on a Compact Disc (CD), flash drive, or other removable media.
If your computer gets infected, at least, you will be able to recover your files from the backup that you have made.
Be careful when opening email attachments, downloading and installing software from unknown or untrusting websites.
How to remove CryptoLocker from your computer?
Click here to view a YouTube video with instructions on how to remove the CryptoLocker from your computer manually. If you are not familiar with the Windows Registry, we recommend asking a friend or a family member who is familiar with the Windows operating system to do it for you.
Note: Some of the names, addresses, email addresses, telephone numbers or other information in samples on this website may have been impersonated or spoofed.
Check the comment section below for additional information and share what you know or ask a question about this article by leaving a comment below.
Remember to forward suspicious, malicious, or phishing email messages to us at the following email address: email@example.com. And, report missing persons, scams, untrustworthy, or fraudulent websites to us. Tell us why you consider the websites untrustworthy or fraudulent. Also, to quickly find answers to your questions, use our search
You can help maintain Online Threat Alerts (OTA) by paying a service fee. Click here to make payment.
Comments, Questions, Answers, or Reviews
To help protect your privacy, please do not post or remove, your full name, telephone number, email address, username, password, account number, credit card information, home address or other sensitive information in or from your comments, questions, or reviews. Also, remember to keep comments, reviews, answers respectful.
Write Your Comment, Question, Answer, or Review
Write your comment, question, answer, or review in the box below to share what you know or to get answers. NB: We will use your IP address to display your approximate location to other users.