CryptoLocker is a form of ransomware that restricts access to infected computers by encrypting its contents. Once infected, victims are expected to pay a “ransom” to decrypt and recover their files.
The primary means of infection is phishing emails with malicious attachments. These emails are designed to mimic the look of legitimate businesses and phony FedEx and UPS tracking notices.
Attackers disguised CryptoLocker attachments to trick unsuspecting users into clicking on an email attachment that activated the attack. Victims then had to pay a ransom to decrypt their files. CryptoLocker spread between early September 2013 and late May 2014.
Cybersecurity Education and Training Begins Here
Here’s how your free trial works:
- Meet with our cybersecurity experts to assess your environment and identify your threat risk exposure
- Within 24 hours and minimal configuration, we’ll deploy our solutions for 30 days
- Experience our technology in action!
- Receive report outlining your security vulnerabilities to help you take immediate action against cybersecurity attacks
Fill out this form to request a meeting with our cybersecurity experts.
Thank you for your submission.
The CryptoLocker ransomware attack occurred between September 5, 2013, and late May 2014. It was identified as a Trojan virus (malicious code disguised as something harmless) that targeted computers running several versions of the Windows operating system. It gained access to a target computer via fake emails designed to mimic the look of legitimate businesses and through phoney FedEx and UPS tracking notices.
Once a machine becomes infected, CryptoLocker removal becomes a difficult task as the computer virus finds and encrypts files located within shared network drives, USB drives, external hard drives, network file shares and even some cloud storage drives. By early November of 2013, CryptoLocker malware had infected about 34,000 machines, mostly in English-speaking countries.
A free encryption tool was released for this in 2014. But various reports suggest that upwards of $27 million was extorted by CryptoLocker.
US-CERT advises users to prevent CryptoLocker ransomware by conducting routine backups of important files and keeping the backups stored offline. Users should also maintain up-to-date antivirus software and keep their operating system and software up to date with the latest patches.
Users should also not follow unsolicited web links in emails and use caution when opening email attachments. And, as always, follow safe practices when browsing the web.
Once your users detect a ransomware demand or virus, they should immediately disconnect from the network. If possible, they should physically take the computer they’ve been using to their IT department. Only the IT security team should attempt a reboot.
Central to your response is whether to pay the ransom. That decision should be based on the type of attack, who in your network has been compromised, and what network permissions the holders of compromised accounts have.
Cryptolocker ransomware attacks are a crime, and organisations should call law enforcement if they fall victim. Forensic technicians can ensure systems aren’t compromised in other ways, gather information to better protect organisations going forward, and try to track down the attackers.
Sometimes, security researchers offer decryptors that can unlock files for free, but they aren’t always available and don’t work for every ransomware attack.
If organisations have followed best practices and maintained system backups, they can quickly restore their systems and resume normal working operations.
 U.S. Computer Emergency Readiness Team (US-CERT), “CryptoLocker Ransomware Infections”
 Dan Goodin (Ars Technica). “You’re infected—if you want to see your data again, pay us $300 in Bitcoins”
 Ryan Naraine (SecurityWeek). “CryptoLocker Infections on the Rise”
 Proofpoint. “Ransomware is Big Business”
 US-CERT. “CryptoLocker Ransomware Infections”
 Proofpoint. “The Ransomware Survival Guide”