{"id":45,"date":"2015-06-01T08:04:54","date_gmt":"2015-06-01T00:04:54","guid":{"rendered":"http:\/\/bankvault.blog.central-data.net\/?p=45"},"modified":"2015-06-01T08:04:54","modified_gmt":"2015-06-01T00:04:54","slug":"cryptolocker-virus-afp-imposter-warning","status":"publish","type":"post","link":"https:\/\/www.bankvault.com\/cryptolocker-virus-afp-imposter-warning\/","title":{"rendered":"Cryptolocker Virus, AFP Imposter Warning"},"content":{"rendered":"
CryptoLocker<\/strong>\u00a0has been gaining its infamous reputation since it was first introduced in 2013 by \u201ckidnapping<\/strong>\u201d important files for a\u00a0ransom<\/strong>.<\/p>\n CryptoLocker propagated through\u00a0infected email attachments or links<\/u>, and when activated, the malware encrypts certain types of files stored on local and mounted network drives, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware’s operators, for a significantly higher price.<\/p>\n Although CryptoLocker itself is readily removed,\u00a0files remained encrypted in a<\/u>\u00a0way which researchers considered infeasible to break<\/u>. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.<\/p>\n Most recent scams include the fake email as\u00a0Australian Federal Police<\/strong>\u00a0and unsuspecting innocents are falling to be the victims.<\/p>\n <Sample Email><\/em><\/strong> What to do\u2026<\/strong><\/p>\n
\n<\/p>\n