It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Thank you.
Some features of ATS will be disabled while you continue to use an ad-blocker.
A new version of the Cryptowall ransom-ware exploiting the anonymous Invisible Internet Project (I2P) network has been uncovered.
Independent security researcher Kaffeine reported uncovering the Cryptowall 3.0 malware, warning in a blog post that the attack has the same advanced encryption powers as previous versions.
Cryptowall is used to create ransomware, a form of malware that attempts to blackmail victims by locking them out of infected machines and charging a removal fee.
A small American law firm has admitted that every document on a server at the Charlotte-Mecklenburg company has fallen prey to the Cryptolocker ransomware, according to a report by local station WSO CTV.
The infection arrived via a phishing email, according to Paul Goodson, who heads the firm in North Carolina state capital Charlotte.
“It was actually an email that looked like it was coming from our phone system because our system sends voice mail messages as an attachment,” said Goodson. Opening the email led to “every single document” at the firm being encrypted, according to CSO’s report.
Goodson says his IT department tried to deal with the malware infection, but after their attempts failed, he attempted to pay the ransom ($300), but was by that point beyond Cryptolocker’s countdown timer. That has left every single document on the firm’s main server – including PDFs and Word documents – encrypted, according to Computer World’s report.
My system was hit last night, somehow managed to skip right by my firewall and Malewarebytes Professional.
originally posted by: PhoenixOD
My system was hit last night, somehow managed to skip right by my firewall and Malewarebytes Professional.
Are you trying to say this was an external attack? Because that's very unlikely, it must have been something you visited, clicked on or downloaded.