After a short-lived hiatus, the creators of CryptoWall have re-emerged with the next generation of the devious malware, coined "CryptoWall 3.0". Just as security experts thought they had a handle on the original threat, the emergence of version 3.0 sparks debate as to what signals to look out for and how to protect against the rise of ransomware variants.
So what's new? Since making its debut last fall and wreaking havoc on thousands of businesses and individuals globally, CryptoWall is the biggest name in ransomware threats. Its predecessor, Cryptolocker, started the snowball effect in 2013 as one of the first ransomware strains to enter the marketplace.
The concept is simple: victims are infected with the CryptoWall malware by opening a malicious email attachment. Once on the system, CryptoWall encrypts the victims’ files and demands a $500 ransom for the files to be saved. Payment must be made within a seven-day period or the ransom will double.
Enter a new wave of the threat -- CryptoWall 3.0. First introduced mid-January 2015, this is a next-gen ransomware variant that is creating more opportunity for hackers as increased privileges and wider infections are more likely, given that the proliferation now uses exploit kits to help the ransomware once it’s on the machine.
Full Article
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.