This isn't something I normally do, but I've already seen this virus do serious damage so I'm getting the warning out as wide as possible. It's a new Windows virus that has an especially destructive payload that is proving very difficult to counter.
The CryptoLocker trojan has been the subject of several recent official US Government warnings. It is spread through an executable (.exe file), usually disguised as an acrobat PDF icon and hidden within an emailed zip file.
When activated, it starts encrypting the data on a host machine and its network shares. Once the data is encrypted it threatens to destroy the data unless a ransom is paid.
Security experts advise there is no way to feasibly de-encrypt the data files, and if the data is not recoverable from backup, the victim is forced to pay the ransom, or lose their data. The creators of the trojan are operating in the deep internet, using bit coins and other anonymous finance systems to accept payments, and so far, have been untraceable.
As an example of how nasty this virus is, even a police department decided to pay the ransom to have its data de-encrypted.
As a consequence, you might consider tweaking your email scanning settings so that executables can no longer be sent via email, and so that compressed files (eg .zip) will also be decompressed and scanned for .exe files.
Be vigilant when opening attachments, especially if they contain .pdf files within a .zip file. Consider this a good time to make sure your virus protection software is up to date and any vital data is backed up.
The CryptoLocker trojan has been the subject of several recent official US Government warnings. It is spread through an executable (.exe file), usually disguised as an acrobat PDF icon and hidden within an emailed zip file.
When activated, it starts encrypting the data on a host machine and its network shares. Once the data is encrypted it threatens to destroy the data unless a ransom is paid.
Security experts advise there is no way to feasibly de-encrypt the data files, and if the data is not recoverable from backup, the victim is forced to pay the ransom, or lose their data. The creators of the trojan are operating in the deep internet, using bit coins and other anonymous finance systems to accept payments, and so far, have been untraceable.
As an example of how nasty this virus is, even a police department decided to pay the ransom to have its data de-encrypted.
As a consequence, you might consider tweaking your email scanning settings so that executables can no longer be sent via email, and so that compressed files (eg .zip) will also be decompressed and scanned for .exe files.
Be vigilant when opening attachments, especially if they contain .pdf files within a .zip file. Consider this a good time to make sure your virus protection software is up to date and any vital data is backed up.