An advanced form of ransomware that first surfaced in September 2013, attacking individuals and companies in the U.K by arriving as an attachment in an e-mail that appears to be a customer complaint. If the attachment is opened, the CryptoLocker Trojan horse infiltrates the computer or server and encrypts all of the files on the computer with commercial-grade 2048-bit RSA encryption, at which point CryptoLocker displays a demand for money notice on the computer.
Also known as Crilock, CryptoLocker typically requires a payment of 300 Euros via digital currency payment methods such as Bitcoins of MoneyPak. The victim is often provided a limited timeframe like 72 hours in which to pay the ransomware fee or risk permanently losing their data.
If the victim does pay the ransom fee, they can expect to receive a decryption key that will restore their data and files, although there's no guarantee that the cyber criminals responsible for the particular variant of CryptoLocker will honor that promise.
CryptoLocker is also able to spread quickly and infect other computers by utilizing other bot networks like ZeuS.
Stay up to date on the latest developments in Internet terminology with a free weekly newsletter from Webopedia. Join to subscribe now.
From keyword analysis to backlinks and Google search engine algorithm updates, our search engine optimization glossary lists 85 SEO terms you need... Read More »Slideshow: History of Microsoft Operating Systems
Microsoft Windows is a family of operating systems for personal computers. In this article we look at the history of Microsoft operating... Read More »Slideshow: Interesting Facts About Google Search
From Goats to Penguins, a server outage and trillions of searches, our slideshow presents interesting facts about Google and the Google.com... Read More »
Java is a high-level programming language. This guide describes the basics of Java, providing an overview of syntax, variables, data types and... Read More »Java Basics, Part 2
This second Study Guide describes the basics of Java, providing an overview of operators, modifiers and control Structures. Read More »The 7 Layers of the OSI Model
The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare... Read More »