
Notice that unlike the original Cryptolocker this ransomware doesn't remove the Shadow Volume Copies of the stored files, thus it's possible to use Windows restore feature to regain control of encrypted data. Owners of the infected computer are advised to remove this virus and recover their files from a backup.įiles encrypted by this ransomware get ".encrypted" extension. Note that paying this fine is equivalent to sending your money to cyber criminals with no guarantee that your files will be decrypted. Cyber criminals order this ransom payment using Ukash, cashU, MoneyPak, or Bitcoin. Note that exploit kits rely on outdated software in order to infiltrate systems, therefore, keeping your operating system and all installed programs up-to-date greatly reduces the risk of infection by ransomware viruses.Īfter successful infiltration, CryptoLocker encrypts files on the infected machine and demands payment of a 300 USD or 300 Euro ransom in order to unblock the computer and decrypt the files. Common sources of exploit kits are infected email messages, malicious websites, and drive-by downloads.

The virus is distributed using 'exploit kits', which infiltrate users' computers using security vulnerabilities detected within outdated software. CryptoLocker is a ransomware virus created by cyber criminals.
