ransomware

(redirected from CryptoLocker)
Also found in: Dictionary.

ransomware

Virus software that blackmails users by encrypting their hard drives or locking them out of the computer. It then demands payment to restore it. A favorite ploy is an FBI message claiming the user has child pornography on the computer, and a fine must be paid or else risk arrest. After paying the blackmail on any of these ransomware attacks, very often via Bitcoin, the user's machine may or may not be restored. Also known as a "cryptovirus" or "cryptotrojan."

In 2013, the creators of CryptoLocker collected millions in ransom by infecting Windows PCs until its distribution was halted a year later by the FBI and Interpol. CryptoLocker was the inspiration for other ransomware variants (gotta love that entrepreneurial spirit!). See Petya.

Mobile Phones Too
In 2014, using the same FBI scare tactic, thousands of Android users found their phones locked with demands for payment. See scareware and wares.

Ransomware Protection
As a result of this delightful phenomenon, numerous firms such as Trend Micro, Symantic, Malwarebytes and Avast Software have added ransomware protection in their lines of security products.


FBI MoneyPak Ransomware
Imagine finding your computer frozen with an FBI alert saying you violated any one or more of video, music or software copyrights or you distributed child pornography. It demands that you put USD $200 cash into a MoneyPak card and enter the card number within 72 hours to unlock your computer and prevent the initiation of a criminal case.
References in periodicals archive ?
Cryptolocker demands payment in bitcoins, which is a virtual currency, and many paid the ransom it demanded in the hope that the data it had encrypted would be unscrambled.
that Cryptolocker was likely to be used more and more by cyber-criminals, becasue of the anonymity afforded by using bitcoins for payment.
As the FBI.gov page on the disruption action notes, it is estimated that around $30 million was paid in CryptoLocker ransoms between September and December 2013 alone.
"CryptoLocker spreads through fake emails designed to
More information about Thirtyseven4's Behavior Detection System and how it prevents CryptoLocker and similar threats is available at: http://thirtyseven4.com/eps_bds.html
While customers turned to Kroll Ontrack to reverse the impact of viruses like CryptoLocker, data storage companies proactively looked to Kroll Ontrack in 2013 to do the reverse--test, validate and certify the effectiveness of the encryption integrated into storage products to ensure no one can get unauthorised access to the data.
They know what CryptoLocker viruses are, and what to do with them."
The next threat to the financial sector can be "Cryptolocker" scam where attacker pretend to be law enforcement and at the same time they will encrypt the user files and request for a ransom for the files that are encrypted [17].
If their operations are shut down for a week because they're locked out of their computer system in a ransomware or cryptolocker incident, that lost revenue could be crippling.
Some forms of ransomware had been given names like Reventon, Cryptolocker, Wannacry and Cryptowall.
In 2013, a file-encrypting ransomware attack dubbed "CryptoLocker" set off a whole new wave of ransomware, engendering copycat attacks like the CryptoWall and TeslaCrypt hacks that took in tens of thousands of dollars in ransom fees.

Full browser ?