Global manufacturers in the field of security software, Trend Micro Inc. has released a warning about the threat of the spread of crypto-ransomware which now began to smell up to other regions in the world. Previously, this threat was rampant and many casualties in the Americas and Europe.
Old variant of crypto-locker, namely Critroni or Curve-Tor-Bitcoin (CTB) Locker, also considered middle sniff Asia. Although not so many incidents were successfully detected in the other regions, but the symptoms would be the outbreak of some new incident-related crypto ransomware is feared will reappear in the near future.
Crypto-ransomware known as one of the variants of ransomware that is able to perform the encryption on a computer system or a file belonging to the victim. Furthermore, the ransomware will ask for ransom money to restore access to user files or computer.
So, what distinguishes CTB-Locker with crypto ransomware variant more? First, CTB Locker will generally hold up the victim to pay for 3 Bitcoins. Uniquely, this threat does not need the internet to perform file encryption, can even continue to function even without a connection.
Other allegations, CTB Locker also offers a free description to the victim for five files, before continuing acts of extortion. Other things, also imposed a deadline extension ransom payment / ransom for files that have been encrypted. In addition, there is a wide choice of languages on multiple messages launched to the victim.
Have you been a victim and how traits infected with CTB Locker? Initially, the victim will receive a spam loaded with malware then downloads CTB Locker. Furthermore, CTB Locker will encrypt any number of files owned by the victim. Finally, begin to emerge hold-up to the victim to make a payment of Bitcoins via TOR.
Paul Oliveria, Technical Communications Manager, confirms that Trend Micro TrendLabs is committed to developing a variety of solutions to combat the emergence of several new variants crypto-ransomware. Not only that, Trend Micro also studied changes in behavior and the threat posed to the victim.
If it is infected, the victims can reclaim their data? Victims are advised to not be tempted to pay, although it has promised the data would come back after they have paid a ransom. Opportunities restoration of files belonging to the victim that has been encrypted thin once, even though the victim had paid a ransom. The best way to protect yourself from these types of threats ransomware is through prevention.
To prevent entrapment sort of CTB Locker ransomware is easy. You need to shy away from any dangerous click links. Furthermore, backup all data on the device peting. Nothing wrong to continue to be vigilant about checking the e-mail you get, especially sure who sent it.
Not only that, you also have to repeatedly check the contents of any messages received. Lastly, make sure that the device you are using already have adequate protection and application performance. Do not forget to always update (update) the application of such protection.
"The indications, several events have been as far back as in a number of new areas. This means that the impact of the attack began to spread. Therefore, we urge all users to be vigilant. Equally important, you should never click on any links sent by people you do not know, "said Paul.
The reason why so many victims from the incident CTB Locker is very diverse. However, the most frequently encountered are the result of low awareness of users when browsing a variety of sites that exist. Not only that, sometimes the user when surfing in cyberspace does not include adequate security protection.
SO BEFORE OPENING A LINK, FIRST CHECK THE LINK IF IT CONTAINS SOMETHING DANGEROUS OR NOT. BECAUSE THE MALICIOUS LINKS SHARED ON VARIOUS SITES. IT COULD BE INCLUDED IN STEEMIT.COM. OPEN LINK CAREFULLY.
regard
Ibnu
Thie is where I got the information
http://beta.chip.co.id/news/technology-corporate-web_internet-security-press_release/14017/trend_micro_waspada_ancaman_crypto_ransomware_semakin_meluas
My Facebook Acoount
https://www.facebook.com/ibnu.tryrosadi
Upvoted you