Wednesday, June 11, 2014

Critical alert regarding a new variation of the Crypto-Locker Trojan.

There is a new variation of the Crypto-Locker Trojan currently attacking computer networks in the US. This is rampant right now so your extra vigilance and care is extremely important.

Do NOT click on any email attachments, faxes, PDF files or any other attachments unless you are 100% positive that it’s from someone you know well AND you are expecting the attachment. Many local companies have already been affected and their networks taken down by this Trojan. These emails are made to look like they are coming from banks, shipping companies and many other vendors we all use on a daily basis.

There is currently no antivirus or anti-malware that can protect you from this nor can it remove and fix the problem afterwards. The only resolution is to format and re-install the affected systems and servers and in many cases, unless you have an offsite backup solution, your critical data is encrypted and unable to be restored. We have found that even paying the ransom will not get your data back as the criminals do not respond even after you’ve send the money.

This is a network Trojan as well so if your local system gets infected it will attack and encrypt any and all files on shared drives – essentially putting your local data beyond your reach and un-useable.

If you make a mistake and click on the attachments which take you to a link outside your office you will be informed that your data has been encrypted and to send a payment to ….. If you see this popup, please immediately turn off your computer, unplug it from the wall and remove the network cable that connects you to your network, the server and the internet. This might help with protecting some of the data on your network shares.

We will keep you informed and updated as this Trojan continues to make it way throughout the US.

In the meantime, if you have any questions or concerns related to this, please do not hesitate to contact our office at or 781-816-9437.

No comments:

Post a Comment