Eset experts warn CryptoLockerem – threatening type of ransomware that encrypts files on the user’s computer and then demands ransom in Bitcoinach. This time cyberoszuści lure their victims mails containing information about the undelivered shipment courier. The alleged sender of the message is to be Polish Post. Rough click on the link provided in the email may end up losing a user to access all their files.
E-traps are sent by cybercriminals who are impersonating well-known institution – Polish Post – trying to lull their victims and to maximize the success of the operation. The aforementioned message-trap contains information about the non-delivery shipment by courier. Infection begins when the victim clicks on the link in the message. Then the network is downloaded and installed a Trojan horse, which instantly pulls from the Internet more malware – in this case CryptoLocker.
The threat, when run on a victim’s device, network drives and encrypts all files, among others, Those with photos, movies and documents user, and then displays a message demanding ransom. If the victim wants to restore access to encrypted files, you must pay the creators of danger.
To guard against such attacks, should start from prevention. Bartholomew Stryczek, Team Leader ESET has prepared a few tips that will help protect you from infection:
1. Create a backup of your files – encrypted files can not be deciphered without knowledge of the secret key, so it’s important to take copies of their files. For this purpose, you can use it.
2. Update the software – through systematic updates, you can be assured that all known vulnerabilities are patched, which significantly affects the safety.
Stay alert while using the web – page suspicious, sudden change in the content of the website or a request for additional data when logging in to the site should arouse your vigilance.
3. Update anti-virus software to the latest version – thanks to a new version of the program, all risks are more effectively detected and blocked. Do not forget to update signature database and program components provided by the manufacturer. It should also make sure that they are not excluded from the scan created in the configuration of the antivirus program, in particular of the email, via which spreads CryptoLocker. It is also important to scan all and files and their extensions were enabled by default.
4. Be careful – do not open attachments from unknown sources, in the case of messages impersonating invoice – verify the account number that is specified in the message body. Customers individual companies always have their own individual account number, and this in phishing email differs from it.
No comments:
Post a Comment