Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

New CryptoJoker Ransomware is No Laughing Matter

b2ap3_thumbnail_problems_with_ransomware_400.jpgToday’s various versions of ransomware are dangerous. By forcibly locking down important files on a victim’s computer, threats like CryptoLocker and CryptoWall are posing significant threats to both businesses and ordinary computer users. However, a new type of ransomware has appeared called CryptoJoker; and we assure you, there’s nothing funny at all about this one.

Like other types of ransomware, CryptoJoker encrypts the victim’s files and issues a decryption key once a ransom has been paid. This ransom is usually demanded in bitcoin to ensure the anonymity for the one holding your data hostage. The idea is to instill fear into the hearts of the victim, so that they make the rash decision to pay hackers for the safe return of their files. Ransomware is typically distributed via email phishing scams, and CryptoJoker is no different. Victims are infected through an installer that’s disguised as a PDF file.

ib cryptojoker

Once the user has installed CryptoJoker, the malware scans all drives connected to the infected device, including network drives. CryptoJoker looks for specific file extensions that will become encrypted. As reported by Bleeping Computer, the following file formats are targeted and encrypted by CryptoJoker:

  • .txt
  • .doc
  • .docx
  • .xls
  • .xlsx
  • .ppt
  • .pptx
  • .odt
  • .jpg
  • .png
  • .csv
  • .sql
  • .mdb
  • .sln
  • .php
  • .asp
  • .aspx
  • .html
  • .xml
  • .psd
  • .java
  • .jpeg
  • .pptm
  • .pptx
  • .xlsb
  • .xlsm
  • .db
  • .docm
  • .sql
  • .pdf

Though CryptoJoker isn’t widely distributed, it’s still a major issue that needs to be dealt with. The biggest problem with CryptoJoker is definitely the quality of its encryption. AES-256 encryption is heavy-duty, which makes it exceptionally difficult (and in most cases, impossible) to retrieve your data without paying the ransom. Supposedly, the only way to get rid of CryptoJoker is by contacting the developers and paying the ransom, so the key is to prevent it from ever infecting your network and data. If you do get infected by CryptoJoker, the solution will be relying on your data backup solution.

So, what can you do if you don’t have a backup of your data for this express reason? It needs to be understood that paying these criminals for the decryption key isn’t an option for your business. What guarantee do you have that they’ll make good on their promise and return your files to you? For all you know, they could take your money and run, leaving you with nothing but an empty wallet (we’ve seen this before with other ransomware). You should never trust a criminal to keep their word, and the developers of CryptoJoker are no different.

If you aren’t certain that your current security solution will protect you from threats like CryptoJoker, now is the time to contact Evolve IT. We can help ensure that your data is backed up properly, and equip your business with the defenses necessary to prevent the latest threats from entering your network. It’s crucial to do this before you get infected, because in cases like this, recovering the encrypted files is next to impossible.

For more information about how we can help you prevent CryptoJoker and other cyber threats, give Evolve IT a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office Backup Operating System Apps Business Continuity Disaster Recovery Communication The Internet of Things Social Media Hacking WiFi Bandwidth Facebook Microsoft Office Firewall Wireless Technology Content Filtering Android Cybercrime Website Apple Best Practice Alert Employer-Employee Relationship Networking History Two-factor Authentication Data storage Data Windows Small Business Experience Phishing App Mobile Computing Big Data communications Safety Mobile Device Management Unified Threat Management Money Network Smartphones Quick Tips Managed Service Provider Outlook IT Services Managed IT services Remote Computing Hosted Solution Shortcut Windows XP Artificial Intelligence Documents DDoS Heating/Cooling Tech Support Word Compliance Bluetooth Drones Social Printer Business Management Browser Automation Wireless Memory Virtual Desktop Competition Unified Communications Securty Presentation Document Management Entrepreneur Encryption Deep Learning VoIP BDR Domains Law Enforcement SaaS Hacker Proactive IT Cortana Vendor Management Network Congestion Application Save Money Customer Service Music Monitors Cryptocurrency Laptop Router IBM Displays Office 365 Google Docs Education Cleaning Holiday Analytics Black Market YouTube Saving Money Processors End of Support intranet Staffing Lithium-ion battery Office Tips LiFi BYOD Downtime Passwords Streaming Media Help Desk Writing Visible Light Communication Social Networking Disaster Micrsooft Public Speaking IP Address Business Growth Virtualization Data Management Advertising Recovery Robot Society Government Sports Retail Augmented Reality Google Wallet Keyboard Spam User Information Technology Running Cable Search Hard Drives Windows 8 Internet of Things
QR-Code