{"id":8203,"date":"2015-08-03T13:15:54","date_gmt":"2015-08-03T13:15:54","guid":{"rendered":"https:\/\/tsisupport.com\/?p=502"},"modified":"2015-08-03T13:15:54","modified_gmt":"2015-08-03T13:15:54","slug":"ransomware-and-the-cryptolocker-threat","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=8203","title":{"rendered":"Ransomware and the Cryptolocker Threat"},"content":{"rendered":"<p style=\"text-align: justify;\">In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus\/data collection malware \u2013 Ransomware \u2013 has been making its rounds on the Internet, and it\u2019s posing quite a problem for many individuals and companies.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>What Is Ransomware?<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">Ransomware is a type of virus that does exactly what it sounds like it does \u2013 it tries to collect a ransom for your data.<\/p>\n<p style=\"text-align: justify;\">In late 2013 a virus called Cryptolocker began making the rounds. While most everyone is familiar with viruses that try to capture your protected information and passwords (phishing), overwhelm your system with SPAM, or that simply shut things down, Cryptolocker did a bit of everything \u2013 and it tries to get money out of you! Experts estimate that the operators of Cryptolocker have extorted anywhere from $3 million to $17million from their victims.<\/p>\n<p style=\"text-align: justify;\">By late 2014, Cryptolocker had been identified and isolated \u2013 but in the meantime a multitude of copycat ransomware viruses have popped up. Many people, however, continue to refer to these ransomware viruses as Cryptolocker, even though they may have another name. So while Cryptolocker \u2013 specifically \u2013 may not be as much of a threat any more, its many copycats are.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>What To Do If You\u2019re Hit<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">The best thing to do is avoid getting hit all together (more on that later), but if it\u2019s already too late \u2013 here are some steps to take to attempt to retrieve your data.<\/p>\n<p style=\"text-align: justify;\">First, if you have a known-to-be-safe backup you can restore your operating system completely and then restore your files from the backup. This will eliminate the virus and give you your files back. However, it\u2019s important to make sure that your backed up files haven\u2019t also been infected \u2013 which is possible if you\u2019re using an external hard drive that was connected at the time of the infection \u2013 otherwise all is for naught.<\/p>\n<p style=\"text-align: justify;\">If that doesn\u2019t work, there is another way! Last year a group of security firms, along with the FBI, worked to infiltrate the group operating the virus. They were able to track the file that held the master encryption codes and put together a site \u2013 Decrypt Cryptolocker \u2013 where the 500,000+ victims can find the key to unlock their files. By simply submitting one of the files that has been encrypted, the database will figure out which key was used and return it to the user. If you find yourself in this boat \u2013 be sure to submit a file that does <em>not<\/em> contain any sensitive information.<\/p>\n<p style=\"text-align: justify;\">If your data is unable to be unlocked using a key generated from the site, that means you may very well be out of luck \u2013 which is why avoiding Cryptolocker all together is so important.<\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #800000;\"><strong>How to Avoid Cryptolocker<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\">There\u2019s no good news here \u2013 it isn\u2019t easy. There are a few prevention tools that have been made specifically to look out for Cryptolocker, since the virus does a pretty great job of masking itself to seem harmless. Some companies have developed kits specifically for businesses that will implement Group Policies in Windows, limit access to network drives, and take other security measures.<\/p>\n<p style=\"text-align: justify;\">As always, you should only open files from sources you trust implicitly. If you open a file (again, it\u2019s generally a PDF) and notice that your computer is actually executing and downloading a file \u2013 shut off your power source immediately. This may stop the virus from fully being able to execute. Unfortunately, many users don\u2019t realize that the file has been executed for days or weeks.<\/p>\n<p style=\"text-align: justify;\">Finally \u2013 ransomware provides one of the best cases to make for regular backups and cloud storage. If your company is interested in learning more about protecting yourself and being prepared with cloud storage, backups, and data restoration should the worst occur,\u00a0<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus\/data collection malware \u2013 Ransomware \u2013 has been making its rounds on the Internet, and it\u2019s posing&hellip;<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[106,107],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware and the Cryptolocker Threat - TSI Support<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware and the Cryptolocker Threat - TSI Support\" \/>\n<meta property=\"og:description\" content=\"In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus\/data collection malware \u2013 Ransomware \u2013 has been making its rounds on the Internet, and it\u2019s posing&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=8203\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-03T13:15:54+00:00\" \/>\n<meta name=\"author\" content=\"Brian Downey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Downey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8203\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8203\",\"name\":\"Ransomware and the Cryptolocker Threat - TSI Support\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"datePublished\":\"2015-08-03T13:15:54+00:00\",\"dateModified\":\"2015-08-03T13:15:54+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\"},\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8203#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=8203\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=8203#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware and the Cryptolocker Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c\",\"name\":\"Brian Downey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g\",\"caption\":\"Brian Downey\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=8\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware and the Cryptolocker Threat - TSI Support","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ransomware and the Cryptolocker Threat - TSI Support","og_description":"In the last few months there has been a lot of national attention on data breaches and infrastructure hacks that are affecting millions of people around the country. In addition to those hacks and breaches, another type of virus\/data collection malware \u2013 Ransomware \u2013 has been making its rounds on the Internet, and it\u2019s posing&hellip;","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=8203","og_site_name":"TSI Support","article_published_time":"2015-08-03T13:15:54+00:00","author":"Brian Downey","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Brian Downey","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8203","url":"https:\/\/tsisupport.com\/tsistaging\/?p=8203","name":"Ransomware and the Cryptolocker Threat - TSI Support","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"datePublished":"2015-08-03T13:15:54+00:00","dateModified":"2015-08-03T13:15:54+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c"},"breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8203#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=8203"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=8203#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Ransomware and the Cryptolocker Threat"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5f0cdfe92d0e3dcabd8dd6bad67b9d8c","name":"Brian Downey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7bc6b8cf711a38beaba894de87689f69?s=96&d=mm&r=g","caption":"Brian Downey"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=8"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8203"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8203"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/8203\/revisions"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}