Hi Everyone:
This message came to me in my email at the College at which I work, warning of a new and very insidious type of malware. I am passing this along to everyone to be careful about any kind of email attachments, or downloads, that you are not aware of their point of origin.
Extend this caution to any type of link or download request that you may see on this or any other forum or blog or social media that you may frequent.
Being forewarned, is being prepared and safe!
To All Faculty and Staff:
There is a new and very damaging malware threat out now. It is spreading very rapidly and has taken down several businesses and caused a lot of damage.
It’s called CryptoLocker and it is a really nasty form of Ransomware. Ransomware is a type of malware that tries to get you to buy the antidote for whatever it infects you with. Then it typically steals your credit card information, and still doesn’t give you the cure.
The CryptoLocker ransomware encrypts all your files so you can’t open any of them. For ransom, it wants several hundred dollars in bitcoins or moneypak payments. But many people who have paid never got the key to unlock their files. The FBI recommends you file a complaint with them and do not pay the ransom.
So far, none of the big antivirus companies have developed a fix for it. It is particularly damaging to businesses because it infects the shared drives on networks and encrypts all of those files too.
The primary method of infection is via phishing emails and email attachments – especially things like FedEx and UPS tracking emails, banking payroll emails, and office document attachments. All the things that companies use constantly. Do not open any email attachment you are not expecting or click on any tracking links.
If you are on a college computer and you get this malware (it pops up a bright red screen letting you know you’re infected – see the picture below), Unplug your computer immediately. Disconnect the power cord and the network cable and call the IT Department. We will need to take immediate steps to safeguard the files in your department Z drive to keep them from being infected and encrypted.
We recommend that that you back up your own home computer files on a flash drive or cd/dvd, because if you get this, your files are gone forever and they are not recoverable if you haven’t backed them up. Back up your pictures and documents and anything else you don’t want to lose.
You should also keep your backup media disconnected from your computer when you aren’t backing up files, otherwise, it will encrypt your backup files too.
You need to be very vigilant about what websites you hit and don’t open email attachments. Make sure your windows OS and office programs are up to date on the security patches.
We will keep you updated on any new patches or fixes for this malware.
Krebsonsecurity.com is a security blog that explains quite a bit about it if you want to learn more.
Be very wary of downloading any programs that claim to fix or prevent CryptoLocker unless they come from major companies like Symantec, Sophos, TrendMicro, etc. If you find one you are unsure about, call the IT Helpdesk and a tech will check it out for you. FoolishIT has released a free CryptoPrevent program for home users but we don’t know yet how safe or effective it is.
There is a picture that came with this email, but I have not yet passed ValleYum's School of Pictures Posting for this site....
This message came to me in my email at the College at which I work, warning of a new and very insidious type of malware. I am passing this along to everyone to be careful about any kind of email attachments, or downloads, that you are not aware of their point of origin.
Extend this caution to any type of link or download request that you may see on this or any other forum or blog or social media that you may frequent.
Being forewarned, is being prepared and safe!
To All Faculty and Staff:
There is a new and very damaging malware threat out now. It is spreading very rapidly and has taken down several businesses and caused a lot of damage.
It’s called CryptoLocker and it is a really nasty form of Ransomware. Ransomware is a type of malware that tries to get you to buy the antidote for whatever it infects you with. Then it typically steals your credit card information, and still doesn’t give you the cure.
The CryptoLocker ransomware encrypts all your files so you can’t open any of them. For ransom, it wants several hundred dollars in bitcoins or moneypak payments. But many people who have paid never got the key to unlock their files. The FBI recommends you file a complaint with them and do not pay the ransom.
So far, none of the big antivirus companies have developed a fix for it. It is particularly damaging to businesses because it infects the shared drives on networks and encrypts all of those files too.
The primary method of infection is via phishing emails and email attachments – especially things like FedEx and UPS tracking emails, banking payroll emails, and office document attachments. All the things that companies use constantly. Do not open any email attachment you are not expecting or click on any tracking links.
If you are on a college computer and you get this malware (it pops up a bright red screen letting you know you’re infected – see the picture below), Unplug your computer immediately. Disconnect the power cord and the network cable and call the IT Department. We will need to take immediate steps to safeguard the files in your department Z drive to keep them from being infected and encrypted.
We recommend that that you back up your own home computer files on a flash drive or cd/dvd, because if you get this, your files are gone forever and they are not recoverable if you haven’t backed them up. Back up your pictures and documents and anything else you don’t want to lose.
You should also keep your backup media disconnected from your computer when you aren’t backing up files, otherwise, it will encrypt your backup files too.
You need to be very vigilant about what websites you hit and don’t open email attachments. Make sure your windows OS and office programs are up to date on the security patches.
We will keep you updated on any new patches or fixes for this malware.
Krebsonsecurity.com is a security blog that explains quite a bit about it if you want to learn more.
Be very wary of downloading any programs that claim to fix or prevent CryptoLocker unless they come from major companies like Symantec, Sophos, TrendMicro, etc. If you find one you are unsure about, call the IT Helpdesk and a tech will check it out for you. FoolishIT has released a free CryptoPrevent program for home users but we don’t know yet how safe or effective it is.
There is a picture that came with this email, but I have not yet passed ValleYum's School of Pictures Posting for this site....
Comment