Ransomware – CryptoWall and Crypto-Clone Information … Now Dyre

Worst Passwords 2015


A History Lesson

Conficker Worm  from 3/27/2009

CryptoWall 2.0 – What is it

New Encryption Stuff and Scams:

As seen on Good Morning America   :Note: Apple Safari  2/19/16

Hollywood Presbyterian Medical Center paid $17,000  2/18/16

Plainsfield, NJ … City files are being held ransom  4/4/16

New Ransom32: The First Javascript Ransomeware 1/6/16


Older Articles

How my Mother got Hacked -> Honor among Thieves

CryptoWall – Dickson County Sheriff’s Office 11/13/14

Small Massachusetts police department forced to pay $500 Bitcoin ransom after hackers held their computer system hostage 4/6/15

Maine police departments pay hackers to unlock computer system 4/10/15

This is a “Notice to Appear” email with the dreaded attachment TROJAN

Dyre Virus – Steals your Bank Credentials from 2014 and still around

IBM uncovers new, sophisticated bank transfer cyber scam 4/2/15

“Suicide Bomber” – The Deleter “Rombertik 05/05/15

Breaking Bad – Los Pollos Hermanos 05/11/15

Click Smart Test – Are you Smart enough?

So … How do I avoid the bullet?

To summarize, there is no good excuse for any user to suffer a significant loss of data or money as a result of a CryptoWall 2.0 infection or any of the clones.  Some of the advice we’ve been dishing out for years still applies, so here are the highlights:


  • Subscribe to a cloud-based, automatic backup service.  External hard drives, thumb drives, and mapped network drives will all be encrypted by any of these ransomware programs; only a cloud-based backup service is beyond their reach. What I recommend MOZY Pro
  • Use a commercial (paid) Anti-Virus Software or Appliance, keep the definitions up to date, and perform a full scan daily.
  • What I recommend EMSISOFT Anti-Malware   ->        Why Emsisoft  *5/15/17 *NEW*
  • Add secondary protection against encrypting ransomware.
  • Apply all Windows Updates automatically, as soon as they are released.
  • Keep Adobe Flash, Air, Reader, and Shockwave updated at all times; ditto for Java, QuickTime, RealPlayer, and other ancillary programs.
  • Be suspicious of any links in e-mails, even those to apparently legitimate sites.
  • Be especially leery of opening any attachment, especially from alleged shippers (UPS, FedEx, DHL, or USPS)


With these precautions in place, it is unlikely the user will fall victim to an encrypting ransomware attack.  And if they do, you can easily restore their unencrypted files from the cloud-based backup you have set up for them.

05/15/17 Wall Street Journal -> How Ransomware works

From the Washington Post: -> Protect your assets by practicing common-sense cybersecurity