We use cookies to give you the best online experience. By using our website you agree to our use of cookies in accordance with our cookie policy.

croom new

Preferred Blog

Preferred has been serving the Tinley Park area since 1991, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: Cryptowall 2.0 Ransomware On the Loose

The latest threats can put a damper on your business plan and put your company at risk. Therefore, it's only natural to protect yourself from them. This new threat in particular, Cryptowall 2.0, has the potential to do plenty of heavy-duty damage to your business's network, if given the opportunity.

New threats surface all of the time, but spear-phishing email attacks are some of the most dangerous out there. Cryptowall, which also goes by the name of Cryptolocker, targets those who are unaware of the emails they receive. The virus is found within zipped folders and PDF files sent via email disguised as invoices, purchase orders, bills, complaints, or other business-related messages. Cryptowall 2.0 is an enhanced version of the original Cryptowall ransomware, which had the power to encrypt files on your network and local data.

Previously, it was fairly simple for network administrators to recover their files. Now, the malware developers have taken extra steps to make it difficult for users to recover their files without paying the fee. Some of the changes made with this enhanced version of Cryptowall include:

  • Unique wallet IDs are used to send ransom payments. The original Cryptowall ransomware didn't use unique payment addresses for each victim, which allowed other victims to potentially take the payments made by others and apply them to their own PC. While this act itself seems like a slap in the face to other victims, it did allow users to recover their files without paying the fee.
  • Cryptowall can now securely delete your original data files. Previously, Cryptowall wouldn't delete the original files, making it easy to use data recovery tools to recover them. This option is no longer possible, meaning that your choices are limited to data backup solutions or paying the ransom.
  • Cryptowall 2.0 uses its own TOR gateways, allowing malware developers to collect the ransom without being detected. Previously, these payment servers could be blacklisted and unreachable; but now that Cryptowall hosts its own TOR gateways, they cannot be blacklisted, and are a much greater threat.

Obviously, this threat is extremely dangerous and should be prepared for. In order to prevent this ransomware from infecting your computer, you must remain ever vigilant. Try some of these tips to avoid getting locked down:

  • Do not open files sent by unfamiliar email addresses. This is the biggest thing you can do to keep yourself safe. This malware attempts to weasel its way past your antivirus and firewall by disguising itself as something else. The best way to keep your network and systems safe is to only open files you can trust.
  • Do not click on links in suspicious emails. By clicking on suspicious links, you're inviting the contents of the malicious website to infect your system. It's best to treat every unfamiliar link with some suspicion, especially until this new threat has been dealt with.

When disaster strikes, you can count on Preferred to be there for you. We can provide you with all of the information you need to know about the latest threats, so you can better protect yourself against them. For more security consulting, or if you think you've been compromised, contact Preferred at 708-781-7110.

Tip of the Week: How to Remotely Wipe Your Android...
To Understand the Hacker, You Must Become the Hack...
 

Comments

No comments made yet. Be the first to submit a comment
Guest
Already Registered? Login Here
Guest
Friday, November 22 2024

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      Qr Code

      Blog Archive

      Latest Blog Entry

      Businesses of every size need to prioritize their security. This fact has not changed and will not change anytime soon. What has changed, however, are the recommended ways to approach this security. Today, we wanted to review the history of today’s predominant cybersecurity ...

      Latest News

      Best Places to Work - 5 YEARS STRONG!!

      Preferred is once again, honored for being a Best Place to Work for the fifth straight year!  Our team is what makes Preferred a Best Place to Work.  

      Daily Herald Suburban Business 2024 Best Places to Work Honorees The Daily Herald Suburban Business has announced the names of 51 companies, in 5 categories of competition, that are honored as the 2024 Best Places to Work in Illinois. This statewide survey and awards program was designed to identify, recognize and honor the best places of employment in Illinois, benefiting the state's economy, its workforce and businesses.