Skip to main content

Posts

Showing posts from August 10, 2014

CryptoLocker industry: techniques, threats, realities, solutions and stakes.

In our fully-digital world, there is nothing nasty like seeing your valuable files, dossiers, video, photos and backups inaccessible, unavailable or impossible to decrypt. With the sophistication and the proliferation of security threats and cybersecurity attacks, this reality is more and more aggressive. Ransomware is a particularly nasty piece of malware that takes, infected machines hostage. In this context, CryptoLocker continues, successful to infect lot of computers and devices. If unfamiliar, Connectikpeople.co, soon #Retinknow®, recalls that, CryptoLocker encrypts the files of computers it infected and then, demandes a ransom for a private key to decrypt those files. Fox-IT and FireEye have established many of the private keys associated with CryptoLocker, and help us inter alia, understand the way that CryptoLocker works: 1.CryptoLocker arrives on a victim’s machine through a variety of techniques such as spear-phishing emails or watering hole attacks. 2.CryptoLocker then connects…