Ransomware Cryptolocker:
CryptoLocker is a ransomware trojan that targets computers running Microsoft Windows,[1] believed to have first been posted to the Internet on 5 September 2013.[2] CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline, and it will threaten to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin.
Ransomware Cryptolocker Attack 2017:
CryptoLocker is a ransomware trojan that targets computers running Microsoft Windows,[1] believed to have first been posted to the Internet on 5 September 2013.[2] CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either bitcoin or a pre-paid cash voucher) is made by a stated deadline, and it will threaten to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in bitcoin.
Ransomware Cryptolocker Attack 2017: