Mailing Lists
Total: 1/1
    1. [Cress] Beware: virus/trogan coming around/JFYI
    2. Nena Smothers
    3. Nena Smothers NE WA Smothers Tribe DNA Project Admin 2002-2014 [email protected] Date: Wed, 5 Feb 2014 17:21:15 -0500 From: [email protected] To: [email protected]; [email protected]; [email protected] Subject: Fwd: This is the Name... CryptoLocker Main article: CryptoLocker Encrypting ransomware reappeared in 2013 with a worm known as "CryptoLocker". Distributed either as an attachment to a malicious e-mail or as a drive-by download, CryptoLocker first attempts to connect to a command-and-control server, after which it generates a 2048-bit RSA public and private key pair, and uploads the key to the server. The malware then attempts to encrypt data on any local or network storage drive that the user can access using a 2048-bit RSA key, targeting files matching a whitelist of file extensions. While the public key is stored on the computer, the private key is stored on the command-and-control server; CryptoLocker demands a payment with either a MoneyPak card or Bitcoin to recover the key and begin decrypting files, and threatens to delete the private key if a payment is not received within 3 days. Due to the extremely large key size it uses, analysts and those affected by the worm have considered CryptoLocker to be extremely difficult to repair. No virus found in this message. Checked by AVG - Version: 2014.0.4259 / Virus Database: 3684/7064 - Release Date: 02/05/14

    02/05/2014 10:17:35