ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Protect Your Computer Files Against the CryptoLocker Virus with External Backup

Updated on March 9, 2014

The Dreaded CrypoLocker Payment Screen

IT Leaders posted a CryptoLocker support page for the public.
IT Leaders posted a CryptoLocker support page for the public. | Source

Oh, no! Not Another Computer Virus!

Recently I've read several news reports from reputable sources about a new computer virus that's spreading like a California wildfire. Its name? CryptoLocker--a virus with the potential to destroy all your computer files, and it's rapidly taking hostages.

Hostages? Did you read that right? Yes, you did. CryptoLocker is a type of ransomware, and "ransom" is the operative word. When the virus invades a computer and infects its system, key files on the hard drive are encrypted and made inaccessible to the user. They are held hostage for a ransom.

Your security software or a computer expert may be able to "uninfect" your computer, but neither can unlock those encrypted key files or allow you access to your computer. Security software companies haven't been able to produce a protection against this virus yet. Even an expert computer tech won't be able to rescue your encrypted files from CryptoLocker. No one but the hackers responsible for the virus can do that--and they have a price. A box on your computer screen will tell you the amount of the ransom and how many hours you have to pay it--usually $300 within 72 hours, although there are accounts of some $700 ransom demands--and the countdown begins on the screen.

So far (and I'll update this if I learn otherwise), this virus is only affecting Windows on PCs. But people with Macs shouldn't start feeling complacent. Successful hackers may decide to diversity.

Scammers are already trying to get in on the act and make some money from this virus scare. When searching "cryptolocker", I saw a link "promising" an "easy trick" to unlock files. Don't be taken in by such false promises. In addition, some copycat hackers are putting messages on computer warning your computer is infected even when it isn't. What's a person to do?



http://commons.wikimedia.org/wiki/File%3ABitcoin.png

By Satoshi
By Satoshi | Source

Should You Pay the Ransom?

Only you can decide if your computer files are valuable enough for you to allow yourself to become the victim of extortionists. If you don't regularly back up your files--and this is important--even if you regularly back up your files to an external device, but you leave that device connected to your computer all the time (as many people do), or if it just happens to be connected at the time CryptoLocker attacks, you may not be able to recover them.

In addition, all the files in shared network files connected at the time of a CryptoLocker invasion may also become encrypted.

Some security experts say this is the worst computer virus they've ever seen. They warn that the cryptography algorithms used by the CryptoLocker virus were developed as long as 30 years ago by governments, even the military, and are unbreakable without the key.

There's the rub. The criminals behind this destructive virus have the key. They also have an evil plan--to force you to pay for the decryption of your files. If you have years of family photos stored online without external backup, or if you have in-process or completed work files stored on the same computer that you use to access email and the Internet, or if you have multiple computers connected via a network, you may have no alternative but to pay up in order to retrieve data and/or images you don't want to lose.

If you choose not to pay by the deadline, the hackers show no mercy. They follow through with their threat and destroy your files. ZAP!

So far, the crooks have kept their promise to decrypt files once they received ramsom payments via hard-to-trace methods as Bitcoins and Green Dot Moneypaks. Does this mean there's some honor among thieves? Not necessarily. Once they've held you up for ransom and you've given them the currency they demanded, who's to say they won't do it to you again?

An estimated 3% of victims paid to rescue their files as of mid-October, 2013, validating the hackers' theory that they launched a profitable business. This means they'll keep on infecting PCs, demanding ransom and destroying files when it's not paid. In short, they'll continue to act as all successful extortionists do.


Back up Your Computer Files Externally--NOW!

If you don't have an external backup device of any type, you should get one ASAP. It's a good investment when you consider the alternative. Most people have one or more flash drives around, but the newer model external storage hard drives are not only faster, but much less expensive than they used to be. You can get a 1TB (that's 1,024 gigabytes) external drive that connects to either a 2.0 or 3.0 USB port. The 3.0 is about three times faster, especially with very large files. Western Digital and Seagate both have 1TB external drives that retail for less than $100. Are your precious photos and manuscripts-in-progress worth it? You bet! In fact, you should have at least two external backup devices and not keep them stored in the same place (in case of fire or other hazards).

~~~~~~~~~~~~~~~~~~~~~~~~~~~~


CryptoLocker gains access to a computer via driveby downloads (read about them here: http://en.wikipedia.org/wiki/Drive-by_download) or infectious attachments to emails (bots) masquerading as legit business emails. Emails purported to be tracking notices from UPS or FedEx may actually be fakes providing a path into your computer's hard drive.

Now is the time to be extra vigilant about the sites you visit on the Internet, downloading from the Web, as well as double-checking the safety of all emails and social network messages before opening. If in doubt, don't do it. Delete suspicious emails unopened.

I encourage you to visit the IT Leaders CryptoLocker Ransomeware Information Guide and FAC (URL shown below) and print all seven pages "just in case." It was compiled on October 14, 2013 and updated October 16. It probably has the most accurate and thorough information extant about CryptoLocker. Its focus is on helping the users of infected computers.

As writers, we work hard to put our words down. Most of us do it on-screen in Word documents, especially early drafts, and many writers don't copy their early work onto a disc or flash drive at that stage. Even if you have a very good memory, you probably don't want to reconstruct an article or story from the recesses of your mind. With this devious virus, CrytoLocker, on the loose, you may want to save even those snippets of writing externally to ensure they're preserved. As with viruses that infect humans, the bottom line is prevention. Routinely backing up your important files is the best thing you can do to keep them safe.

Hopefully, the good guys (and gals) will catch the bad ones--the hacker/extortionists--and put an end to CryptoLocker for good!

Would You Pay the CryptoLocker Ransom?

If your computer or computer network contains important files (documents, images, spreadsheets) that aren't backed up, would you pay a ransom to rescue them if CryptoLocker encryped those files?

See results

Protect Your Computer Files

Source

CryptoLocker--Begone!

As writers, we work hard to put our words down. Most of us do it on-screen in Word documents, especially early drafts, and many writers don't copy their early work onto a disc or flash drive at that stage. Even if you have a very good memory, you probably don't want to reconstruct an article or story from your mind. With this devious virus, CrytoLocker, on the loose, you may want to save even those snippets of writing externally.

I don't pretend to be very computer-savvy or "techie"--just the opposite. That is why I take such threats as this new-on-the-scene virus seriously. I don't like having to pay for costly computer repairs, and I especially don't want to chance losing any files I consider important.

Hopefully, the good guys (and gals) will catch the bad ones--the hacker/extortionists--and put an end to CryptoLocker for good!

Thanks for reading and supporting this HubPages writer!


Please vote and leave comments. Your feedback is valuable--especially if you're one of the many HubPages members or visitors who IS computer-savvy and/or "techie" and may be able to offer some useful protective advice for the rest of us.

NOTE: I am the author of this article, and it is owned by me in entirety. It is not available for use by reproducing in any form without my express written permission. If you see all or any part of this article (as written) on another site, please notify me where it can be found. Theft of a writer's work is plagiarism, and stealing another's words is no less wrong than any other theft.

© 2013 Jaye Denman

working

This website uses cookies

As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://corp.maven.io/privacy-policy

Show Details
Necessary
HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
LoginThis is necessary to sign in to the HubPages Service.
Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
AkismetThis is used to detect comment spam. (Privacy Policy)
HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
Features
Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
MavenThis supports the Maven widget and search functionality. (Privacy Policy)
Marketing
Google AdSenseThis is an ad network. (Privacy Policy)
Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
Index ExchangeThis is an ad network. (Privacy Policy)
SovrnThis is an ad network. (Privacy Policy)
Facebook AdsThis is an ad network. (Privacy Policy)
Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
AppNexusThis is an ad network. (Privacy Policy)
OpenxThis is an ad network. (Privacy Policy)
Rubicon ProjectThis is an ad network. (Privacy Policy)
TripleLiftThis is an ad network. (Privacy Policy)
Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
Statistics
Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
ClickscoThis is a data management platform studying reader behavior (Privacy Policy)