Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt.
Attributes | Values |
---|
rdf:type
| |
rdfs:label
| |
rdfs:comment
| - Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt.
|
sameAs
| |
dcterms:subject
| |
dbkwik:malware/pro...iPageUsesTemplate
| |
Platform
| |
Name
| |
Type
| |
filetype
| |
abstract
| - Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt. Only one known case of file decryption is currently known. A man put Cryptolocker on his computer and paid the ransom. It had worked but only for him. Once Cryptolocker has finished decrypting the files, it deletes itself just so the user can retrieve their files and use their computer again.
|