About: Cryptolocker   Sponge Permalink

An Entity of Type : dbkwik:resource/uazuHg3wEfJ5Uid5iYR3Jw==, within Data Space : 134.155.108.49:8890 associated with source dataset(s)

Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt.

AttributesValues
rdf:type
rdfs:label
  • Cryptolocker
rdfs:comment
  • Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt.
sameAs
dcterms:subject
dbkwik:malware/pro...iPageUsesTemplate
Platform
  • Microsoft Windows
Name
  • Cryptolocker
Type
  • Ransomware
filetype
  • .EXE
abstract
  • Cryptolocker's payload encrypts the victim's files using a method of encryption that is extremely hard to crack or decrypt (RSA-2048), and refuses to unlock the files until the ransom of 500 units of currency ($500, €500, £500, etc.) is paid. However, people who have paid the ransom have not had their files decrypted yet. It gives about 72 hours for the ransom to be paid, and if this is not done, then the program deletes the decryption code (preventing any recovery of data). The virus was last updated the 20th of November 2013 and isn't as notorious as previous versions. While easy enough to remove, the files still remain encrypted. It has one other copy: Teslacrypt. Only one known case of file decryption is currently known. A man put Cryptolocker on his computer and paid the ransom. It had worked but only for him. Once Cryptolocker has finished decrypting the files, it deletes itself just so the user can retrieve their files and use their computer again.
Alternative Linked Data Views: ODE     Raw Data in: CXML | CSV | RDF ( N-Triples N3/Turtle JSON XML ) | OData ( Atom JSON ) | Microdata ( JSON HTML) | JSON-LD    About   
This material is Open Knowledge   W3C Semantic Web Technology [RDF Data] Valid XHTML + RDFa
OpenLink Virtuoso version 07.20.3217, on Linux (x86_64-pc-linux-gnu), Standard Edition
Data on this page belongs to its respective rights holders.
Virtuoso Faceted Browser Copyright © 2009-2012 OpenLink Software