12 Points Technologies
  • Managed Services
    • IT Support
      • Managed Support Services
      • Data Backup and Disaster Recovery
      • Managed Network and Infrastructure
      • Co-Managed IT
    • Cloud
      • Cloud Migration
      • Private Cloud Hosting
  • Security
    • Cybersecurity
      • Advanced Threat Protection
      • Security Assessment
      • Vulnerability Management
      • Incident Detection & Response
      • Network Monitoring
    • Physical Security
      • Access Control
      • Visual Security
  • VoIP / Webex
    • Webex Cloud Solutions
    • Unified Communications
    • Business Phone Systems
  • About Us
    • Leadership Team
    • Blog
    • Partners
    • Testimonials
    • Customer Referral
    • Careers
  • Contact Us
  • GET A QUOTE
  • Menu Menu

CryptoLocker: Should I Pay the Ransom?

Hackers and other online predators are always looking for new and different ways to create havoc on the Internet. One of the most malicious forms of hacking is called ‘ransomware’, which is basically a hacker holding someone’s files for ransom by encrypting them until the owner pays to have them unlocked or restored.

There are many different types of ransomware, with the most commonly known being called CryptoLocker. Most ransomware set a time limit in which to send the payment. If the victim does not send the money, their files are lost to them forever (or the ‘kidnapper’ will make another demand for even more money).

So how does CryptoLocker work and, more importantly, what should you do if you become a victim? CryptoLocker and other ransomware generally use social engineering techniques to trick the user into running it. An example of an attack is that a potential victim will receive an email with a password-protected ZIP file pretending to be from a logistics company. When the user opens the ZIP file and attempts to open the PDF inside, the Trojan saves itself to a folder in the user’s profile, adds a key to the computer registry to make sure it runs every time the computer starts up and protects itself from being terminated. It then begins encrypting all the files on the computer. The latest ransomware variants also scan for network and USB drives, and even cloud data such as popular file-sharing utilities, putting not just the local files at risk, but also the potential of all accessible company files. When the ransomware is finished encrypting, the victim receives a message demanding money for the return of their data. A recent variant of this example uses the same mechanism, however the ZIP file contains a tiny attachment that appears to be a simple text file. When the user opens the file, a connection is made to a malicious web site that silently downloads the Trojan and executes the attack.

Of course, the best way to combat any malware or virus is to avoid getting it in the first place. Don’t ever open an attachment from a sender you don’t know. Period. You can also disable hidden file extensions in Windows, which can help you recognize the type of attack as often the malicious files end with extensions such as “.EXE” or “.JS”. We also highly recommend making back-ups of any important files. If you’re diligent about backing up information, attacks like these lose their power because you are no longer at the hacker’s mercy—you can simply access your back-up files instead of paying for the decryption.

In a perfect world, everyone would put these precautions into place. However, we understand we don’t live in a perfect world and mistakes and oversights happen. If you DO become a victim of CryptoLocker, we recommend you do not pay the ransom. Will you get your files back? Maybe, but not necessarily in a usable form. Additionally, paying the ransom will most likely encourage these types of attacks to continue as they become highly profitable. If your files are absolutely critical and you must have them, the only option then becomes to pay the ransom and possibly be able to decrypt your files. There is no concrete data out there about the recovery rate once a ransom is paid, so if you choose this option, you’re still taking the chance you might never get your files back. In addition, if you pay the ransom once, it’s quite likely the attacker will come after you again, demanding even larger sums of money.

As with any security issue, an ounce of prevention is worth a pound of cure when it comes to CryptoLocker or any ransomware. Make it a policy not to open attachments from sources you do not fully trust and have a dependable back-up process and these types of attacks will pose much less of a threat for you or your business.

Tony Cody is the Founder and CEO of 12 Points Technologies, a digital forensics and cyber security company that helps protect businesses from online threats, recover from online incidents and provides services for those who need to recover critical information from digital devices. Tony has over 20 years of IT experience with the U.S. military and private firms. For more information, please visit www.12PointsInc.com.

Share This Post

  • Share on Facebook
  • Share on X
  • Share on LinkedIn
  • Share on Reddit
  • Share by Mail

Related Postings

importance of network security

Why Network Security Is Important: The Key to Business Continuity

Cybersecurity, IT Services
Read more
January 27, 2025
Email Security For Small Business

Email Security for Small Businesses: Simple Steps to Stay Protected

Cybersecurity, IT Services
Read more
January 9, 2025
SMB Security Guide

Cybersecurity Guide for SMBs: Key Tips and Tools to Secure Your Business

Cybersecurity, IT Services
Read more
December 23, 2024

Categories

  • Cybersecurity
  • Digital Forensics
  • Door Security
  • IT Services
  • Managed Services

About Us

The experts at 12 Points Technologies LLC offer the highest level of Cyber Security, Digital Forensics, and Managed Service solutions to meet your needs.

What We Do

Managed IT Services in Omaha

IT Support

VoIP

Cybersecurity

Cloud

Digital Forensics

Contact Us

3730 S 149th St Suite 101
Omaha, NE 68135

SALES: (402) 844-1007
SUPPORT: (402) 401-6810

info@12pointsinc.com

Website by Abstrakt Marketing Group © 2025
  • Privacy Policy
  • Sitemap
  • Linkedin
  • Facebook
Scroll to top Scroll to top Scroll to top

This site uses cookies. By continuing to browse the site, you are agreeing to our use of cookies.

AcceptLearn more

Cookie and Privacy Settings



How we use cookies

We may request cookies to be set on your device. We use cookies to let us know when you visit our websites, how you interact with us, to enrich your user experience, and to customize your relationship with our website.

Click on the different category headings to find out more. You can also change some of your preferences. Note that blocking some types of cookies may impact your experience on our websites and the services we are able to offer.

Essential Website Cookies

These cookies are strictly necessary to provide you with services available through our website and to use some of its features.

Because these cookies are strictly necessary to deliver the website, refusing them will have impact how our site functions. You always can block or delete cookies by changing your browser settings and force blocking all cookies on this website. But this will always prompt you to accept/refuse cookies when revisiting our site.

We fully respect if you want to refuse cookies but to avoid asking you again and again kindly allow us to store a cookie for that. You are free to opt out any time or opt in for other cookies to get a better experience. If you refuse cookies we will remove all set cookies in our domain.

We provide you with a list of stored cookies on your computer in our domain so you can check what we stored. Due to security reasons we are not able to show or modify cookies from other domains. You can check these in your browser security settings.

Other external services

We also use different external services like Google Webfonts, Google Maps, and external Video providers. Since these providers may collect personal data like your IP address we allow you to block them here. Please be aware that this might heavily reduce the functionality and appearance of our site. Changes will take effect once you reload the page.

Google Webfont Settings:

Google Map Settings:

Google reCaptcha Settings:

Vimeo and Youtube video embeds:

Accept settingsHide notification only

12pointsinc logo
Telling us about your needs can help us get you more accurate information.