Explore the latest news and trends  

Keep yourself up to date with one of the following options:

  • Explore more news around Spam/Phishing, Malware/Cyber-attacks and Antivirus
  • Receive news and special offers from SPAMfighter directly in you inbox.
  • Get free tips and tricks from our blog and improve your security when surfing the net.
  • Go

CryptoLocker Ransomware Scammers Charge Lowered Price of 0.5 Bitcoins for Data Retrieval

Internet crooks responsible for CryptoLocker, name of a ransomware scam, have brought down its decryption price from an initial 2 Bitcoins ($868) to 0.5 Bitcoins, therefore setting the price approximately at $300, which was the rate they'd demanded during the first round of the scam, state security researchers at F-Secure the Finland-based security company.

A change was noticed within certain CryptoLocker variant, which emerged on 20th November 2013. Nevertheless, the reduced price does not imply that the scammers will be satisfied with lower income; however, since Bitcoins' price was recently raised, they required making an adjustment of it to their demanded value.

Evidently, CryptoLocker is sent through e-mail in the form of executable file masked to appear like a PDF within certain zipped attachment. If run, this ransomware encrypts everything inside the target computer's hard drive along with its local drive that maybe connected to the hard drive. Thereafter, it asks for the ransom to get the private unlocking code. The victimized user is told he requires making the payment in 72-hrs failing which all his encrypted data would get wholly erased.

However, according to one recent fresh service, data restoration can be done even past the maximum 72-hrs timeline for the ransom payment, but at an increased price-level.

Reportedly, in UK, people in millions are by now recipients of e-mails which are spreading the CryptoLocker.

Within United States, the Massachusetts based Swansea Police Department lately decided to make one $750 ransom payment so it could retrieve its files under CryptoLocker scammers' control.

Security Researchers Sean Sullivan of F-Secure posts that the unidentified cyber-criminals responsible for CryptoLocker are just carrying out routine business activities eventually concentrating on churning the maximum revenue out of their nefarious operations, reported theregister.co.uk dated November 25, 2013.

And since the optimum action is always maintaining prevention, Web-surfers must remain wary of avoiding attachments of the above kind; make their anti-virus and operating systems up-to-date; and regularly back up all their user-created files.

Finally, if a PC gets contaminated, it's important to quarantine the system off the network, while seek professional help for cleansing the same.

ยป SPAMfighter News - 28-11-2013

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Exchange Anti Spam Filter
Go back to previous page
Next