CryptoLocker takes advantage of Windows’ default behavior of hiding the extension from file names to disguise the real. It gets run when the victim opens the attached ZIP file by entering the password included in the message, and attempts to open the PDF it contains. The Trojan spreads as an email attachment and through a botnet for P2P file sharing. Once installed, CryptoLocker encrypts certain files it finds on the infected computer and displays a ransom note on the screen, demanding hundreds of dollars in bitcoin for the decryption key. It is programmed to affect Microsoft Windows systems and block access to files until a ransom is paid to the malware authors. CryptoLocker is a ransomware specimen designed to infect computers through a Trojan.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |