How to avoid CryptoLocked backup filesīeing in a situation where all of your important files AND backups are encrypted is not something you want to experience! In corporate IT environments, this should not usually be a problem because CryptoLocker variants are mostly run by the user.
While only predicted by security firms a few months ago, these types of attacks continue to be on the increase.Ī warning for the future: With the continued rise of the Internet of Things, big data and more connected networks, you will be seeing these types of attacks A LOT more often in the future. If this happens, it could soon lead to encrypted files on those services and you will be unaware as you are downloading encrypted files to one of these locations. Another issue is that attackers can now target cloud storage, such as Dropbox, OneDrive, Google Drive and many more. In the event that your files are being encrypted, the files will get uploaded and you lose access to them as well. The problem, however, is that most of those files will be synchronized (back and forth) the moment something changes. Some people claim that using target cloud storage services such as Dropbox, OneDrive, Google Drive and others will save their bacon. Dropbox, OneDrive, Google Drive and beyond There are even some variants that will also encrypt your backup files and leave you empty-handed in the end. Worse, there are reports of people paying the ransom to get their files back, but still not receiving the deciphering key. If you don’t have a Cryptolocker backup strategy, you risk losing all your files. Even when you successfully remove this Trojan, the files will remain encrypted. They then request a ransom (bitcoins) in exchange for the deciphering key. These Trojans can encrypt a certain amount of computer files (mostly based on the file type). The name, CryptoLocker, is still used for the different variants, even though they are technically all called Ransomware.
There are more variants or clones of this specific Trojan around today, and while not related to the original CryptoLocker, they all basically do the same thing. For those of you who haven’t heard of it, it is a Trojan Ransomware that’s specifically targeted to computers running the Windows OS (operating system). CryptoLocker has been in the news a lot recently.