An interesting article about TeslaCrypt ransomware virus: http://www.engadget.com/2016/04/06/history-and-evolution-of-teslacrypt-ransomware-virus/
Wednesday, April 6, 2016
Tuesday, April 5, 2016
Locky Ransomware Virus Is on the Rise
The easy availability of Locky malware attracts a number of distributors. Those propagators are unrelated to each
other. They make use of any possible method of introduction. Naturally, some of
them have already been caught at spreading the malware. The point is, they are
not much closer to the arch villain than anyone.
The ransoming virus installation details vary from case to
case. The prevailing infection vector is known. Most of the infiltration cases are
due to opening spam mail attachments.
The introduction is to be followed by installation of the
Locky ranowmare. The latter requires an affected system to reboot. One can prevent the
encryption already at that stage. If a sudden reboot is happening, it is worth
switching your computer to Safe Mode: the malware is not able to complete its installation.
If it succeeds in its encrypting attempts, the victims are
presented with a relevant ransom note. The note
is available at each folder with affected
files. Several formats convey the same notification to ensure the users would
read it.
The removal of Locky
encryption shall include the ransomware elimination and data recovery. Whenever
possible, the victims shall abstain from purchasing the key as prompted by the
scammers. Relevant instructions on how to handle and prevent Locky invasion follow: http://myspybot.com/decrypt-locky-files/
Subscribe to:
Posts (Atom)