CryptoLocker Virus Ransomware: What to Know

There’s a new virus running rampant on the internet known as CryptoLocker ransomware.

The CryptoLocker worm spreads through drive-by downloads, as attachments or as fake emails disguised as a legitimate message, for instance FedEx and UPS tracking notifications.

Naturally, this poses as one of the larger cyber security threats to business given the nature of the way it penetrates a network.

What This Means For You

This virus is referred to as ‘ransomware’ because once your computer is infected, a notice pops up on your screen threatening to hold your files hostage unless you pay $300 to restore your files.

There is of course no guarantee that paying the $300 ransom will lead to the restoration of your files because they are encrypted, and you’re dealing with some very unscrupulous characters you don’t want to get involved with.

This virus, unlike others, can permanently destroy every email, file or photo on your computer.

One of the best precautions against this type of virus (and many others) is through the security of your system.

If your computer or network has been infected by the CryptoLocker virus, call us at (262) 522-8560 or register for a Free Network Discovery where we will evaluate your network and ensure your equipment and network is always protected moving forward.

For more information, see the following resources:

CryptoLocker malware demands ransom for computer files held hostage

 Cryptolocker Ransomware

CryptoLocker ups the ante, demands $2,000 for overdue ransom


Schedule a network security assessment

Request a security assessment below. We'll contact you to schedule a complementary introductory meeting to discuss the details of the assessment and how we can best assist you.

*This security analysis is not all encompassing. However, the results of this analysis may prompt additional recommendations that are more focused on specific aspects of your environment. EX: PCI & HIPAA audits, in-depth anti-virus testing, firewall/router audit, etc.