A History Lesson
Conficker Worm from 3/27/2009
New Encryption Stuff and Scams:
Dyre Virus – Steals your Bank Credentials from 2014 and still around
Breaking Bad – Los Pollos Hermanos 05/11/15
So … How do I avoid the bullet?
To summarize, there is no good excuse for any user to suffer a significant loss of data or money as a result of a CryptoWall 2.0 infection or any of the clones. Some of the advice we’ve been dishing out for years still applies, so here are the highlights:
- Subscribe to a cloud-based, automatic backup service. External hard drives, thumb drives, and mapped network drives will all be encrypted by any of these ransomware programs; only a cloud-based backup service is beyond their reach. What I recommend MOZY Pro
- Use a commercial (paid) Anti-Virus Software or Appliance, keep the definitions up to date, and perform a full scan daily.
- What I recommend EMSISOFT Anti-Malware -> Why Emsisoft *5/15/17 *NEW*
- Add secondary protection against encrypting ransomware.
- Apply all Windows Updates automatically, as soon as they are released.
- Keep Adobe Flash, Air, Reader, and Shockwave updated at all times; ditto for Java, QuickTime, RealPlayer, and other ancillary programs.
- Be suspicious of any links in e-mails, even those to apparently legitimate sites.
- Be especially leery of opening any attachment, especially from alleged shippers (UPS, FedEx, DHL, or USPS)
With these precautions in place, it is unlikely the user will fall victim to an encrypting ransomware attack. And if they do, you can easily restore their unencrypted files from the cloud-based backup you have set up for them.