An advanced form of ransomware that first surfaced in September 2013, attacking individuals and companies in the U.K by arriving as an attachment in an e-mail that appears to be a customer complaint. If the attachment is opened, the CryptoLocker Trojan horse infiltrates the computer or server and encrypts all of the files on the computer with commercial-grade 2048-bit RSA encryption, at which point CryptoLocker displays a demand for money notice on the computer.
Also known as Crilock, CryptoLocker typically requires a payment of 300 Euros via digital currency payment methods such as Bitcoins of MoneyPak. The victim is often provided a limited timeframe like 72 hours in which to pay the ransomware fee or risk permanently losing their data.
If the victim does pay the ransom fee, they can expect to receive a decryption key that will restore their data and files, although there's no guarantee that the cyber criminals responsible for the particular variant of CryptoLocker will honor that promise.
CryptoLocker is also able to spread quickly and infect other computers by utilizing other bot networks like ZeuS.
From secure messaging to document editing, our top free must-have apps have been rated, reviewed and named the best free Android apps of 2015. Read More »The Five Generations of Computers
Learn about each of the five generations of computers and major technology developments that have led to the current devices that we use today. Read More »Cloud Computing Market Leaders, 2015
If not for AWS, Microsoft would dominate the cloud. The race to capture market share will grow ever more fierce in the years ahead. Here's a look... Read More »
From wacky alarm clocks to lecture hall tools and after class entertainment, these Android apps are a good fit for a student's life and budget. Read More »Network Fundamentals Study Guide
A network is a group of two or more computer systems or devices, linked together to share resources, exchange files and electronic communications.... Read More »Computer Architecture Study Guide
This Webopedia study guide describes the different parts of a computer system and their relations. Read More »
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
- Watch Datamation's editor James Maguire moderate roundtable discussions with tech experts from companies such as Accenture, Dell, Blue Jeans Network, Microsoft and more »