

As soon as this routine is complete, the ransomware encrypts the detected files with AES algorithm, and then encodes the AES key with RSA cryptosystem. Only good judgment and making sure that every website, and every email you open is carefully evaluated before proceeding.CryptoLocker first scans the hard drive for files with extensions from a hard-coded range.

There is no real method for preventing the payload being delivered to your computer. There was no server to complete the transaction and therefore the data remained lost.

Many of the servers were finally brought down and that in itself presented a problem for those who caught the virus and tried to pay. In the final analysis, and looking from a strictly objective point of view, Cryptolocker in its delivery method as well as it execution and ultimate payment process offers a well planned and executed criminal enterprise that no one was ever brought to trial for. It is estimated that over 25 million dollars has been extorted from those who have gotten the virus. There is only one method for getting your data back and that is to pay the 300 to 400 dollars using the Bitcoin path of money transfer. Since the key has been deleted there is no method for decrypting the data including brute force methods. This is a grave error as the key to decrypt the data is embedded in the virus executable file. Most users will run a virus scanner and remove the virus from the computer. It is at this time that a mistake is usually made. Once your data has been encrypted a covert server will send a message asking for a sum of money to decrypt the data. The virus starts at older dated files and then continues up the chain until more recently used files are encrypted and then the virus exposes itself. If the virus remains undetected then pictures, music, and video are destroyed. Files such as spread sheets, documents, and text files are attacked first and encrypted. The virus makes its way through your file system by targeting specific file types in order to achieve maximum damage. In addition websites can introduce the malware through the use of an advertisement click through that again places the bot on your computer and the process begins. Disguised in the email it immediately propagates the bot and begins its malicious attack on your data. The virus is introduced through an infected attachment in an email. The following is the method of transmission, assimilation, and recovering from the Cryptolocker virus.

In conjunction with that the method for recovery from the virus is ingenious at best, and diabolical at worst. In a nutshell it takes all of your files and over a period of days, weeks, and or months turns your most used and precious data into a conglomeration of unusable junk. The Cryptolocker virus is in fact that type of program. A fter being in the technical industry for over thirty years it takes something fairly unique to pique my attention.
