ESET experts warn again CryptoLockerem
- The type of ransomware threat that encrypts files on the
a user’s computer, and then requests a ransom in bitcoinach. This time
cyberoszuści lure their victims mails containing information about
undelivered consignment courier. The alleged sender of the message is to be
Polish Post. Rough click on the link provided in the email may end
for the user losing access to all your files.
News-Trap,
before which experts warn of ESET, distributed by
cyber criminals who are impersonating well-known institution – Polish Post -
They try to lull their victims and to maximize mission success
operation. The aforementioned message-trap contains information about the non-delivery
shipment by courier. Infection begins when the victim clicks in
link in the message. Then the network is downloaded and installed horse
Trojan, who quickly pulls from the Internet more malware -
In this case CryptoLocker.
The threat, when run on a victim’s machine,
network drives and encrypts all files, among others, Those with photos, movies or
user documents, and then displays a message demanding ransom.
If the victim wants to restore access to encrypted files, you must pay
authors threat.
To
protect themselves against these attacks, you should start from prevention. Bartholomew Noose, Team Leader ESET has prepared a few tips that will help
protect yourself from infection:
- Create a backup of your files – encrypted files can not be deciphered without
knowledge of the secret key, so it’s important to take copies of their
files. For this purpose, you can use it. - Software Update – with systematic updates, you can be sure that
all known vulnerabilities have been patched, which significantly affects the safety.
Save
alertness while using the network – suspicious party sudden change site content
Web or a request for additional data when logging in to the site should
raise your vigilance. - Update
antivirus software to the latest version – with a new version of the program, all the risks are
more effectively detected and blocked. Do not forget to update
signature database and program components provided by the manufacturer. It is worth
Also, make sure they are not made to exclude from scanning
antivirus program configuration, in particular of the email,
whereby the spreading CryptoLocker. It is also important to
and scans all files and their expansion was enabled by default. - Be careful – Do not open attachments from unknown sources.
in the case of messages impersonating invoice – verify the number
What account is given in the message body. Customers always have the individual companies
own individual account number, and this in different phishing messages
from him.
No comments:
Post a Comment