CryptoLocker Ransomware Evolves
Previously a Trojan which relied on user interaction to spread the ransomware and infect a user's computer, CryptoLocker has morphed into a new worm variant. Researchers at Trend Micro have found that CryptoLocker is able to be spread from computer to computer by using a USB drive or by being downloaded from unsafe sites such as P2P file sharing websites. By utilizing a USB drive that is infected, the ransomware spreads to files on the computer that the drive is attached to and even looks for other computers on the network to infect, if connected. The ransomware can also spread itself by being a fake activator for software such as Adobe Photoshop and Microsoft Office, which are generally shared on P2P websites. CryptoLocker encrypts various files on a computer system and makes users pay a ransom to unlock their files. Since the affected files are encrypted, removing the malware does not aid in retrieving the files for accessibility and one of the only ways to remove the ransomware at this time is by doing a complete system format.
Trend Micro is advising users to keep away from P2P file sharing sites in order to retrieve illegal copies of software. Additionally, Trend Micro is cautioning the use of USB drives, especially those of unknown origin.
Source: PC Magazine