Similar to CryptoLocker, Cyber Criminals have released another version to the CryptoWall virus-version 2.0. This ransomware is spreading very quickly through unsolicited downloads and file attachments in emails such as pdfs and zip files. As with other ransomware viruses, CryptoWall infects an opening in the system, encrypts the users’ files (pictures, texts, files, documents, etc...) and demands payment in order to recover those files. It is vital to your organization to have policies in place to prevent these types of attacks.
Do not open suspicious email attachments
Alert co-workers, friends and family to avoid opening any email attachments from sources they were not expecting or information they may not have been expecting: banking institutions, credit card companies, faxes, quotes, or purchase orders.
These messages are crafted to spark urgency in opening the files without questioning them. In many cases, these emails contain misspellings, poor grammar, and incorrect information.
Avoid downloading applications from ads online
Once these files are downloaded, the virus is able to get into your system and start corrupting the files. The virus also encrypts any network storage files that you may have access to on the network. If you are unsure if a file should be downloaded, contact your Network Administrator.
What to do if you are infected
In order to minimize the damage already done, the easiest thing to do is immediately shutdown the workstation. If you are unsure what device is infected, it is best to shutdown all work stations in your network to limit the impact the malware is posing to your data. After you shutdown what you feel is the infected device(s) on your network, immediately contact River Run Computers at 414-228-5009.
Click here for additional information on this virus.