Tuesday, August 25, 2015

Upgrading to Windows 10 – watch out for malicious software … – Onet.pl

Before mails offering bogus update to the Windows operating system warns BitDefender antivirus lab. Visible as the sender address update@microsoft.com.pl can lull many people, candidates do not realize that the record in this place can be freely swapped. For this theme: “Free upgrade Windows 10″ and blue background in the content can convince people to open the attachment.

Unfortunately, this is just another of criminals whose aim is to infect computers with malware CTB Locker. The victim sees on his computer screen a message like this:

“Your private data has been encrypted by CTB-Locker . Your documents, images, databases and other important files have been encrypted powerful and unique encryption key generated by the computer. Individual decryption key is stored on a private server on the internet and nobody decrypt your data before you do not pay and you can download the key.

You have 96 hours to deposit. If you do not put money in the allotted time, all your files will be encrypted on a permanent basis, and no one will be able to get them back.

Click” View “to see a list of files that have been encrypted.

Click” Next “to go to the next page.

WARNING: Do not try to get rid of the program on their own. Any action may remove the private decryption key. Then you lose your files forever. The only way to recover your data is to make the above statement. “

On infected computers, you will be prompted fees ($ 600) for a key that will decrypt the encrypted data – without the decryption is impossible. When the “ransom” is paid, decryption should start automatically.

CTB Locker is a successor of the popular Cryptolockera. Despite a partial combat this ransomware, he was able to return to later. Unfortunately, this type of malware is constantly evolving and becoming more and more dangerous, while achieving new levels of complexity.

“This version malicious messages creates the ideal context for cybercriminals who fully in this exercise,” says Bogdan Botezatu, a senior e-threats analyst at Bitdefender.

According to BitDefender Labs, malware emails were sent within three days of spam servers located in Russia, the USA, Thailand, Ukraine, India, Kazakhstan, Taiwan and France.

LikeTweet

No comments:

Post a Comment