CryptoWall: Back With A Vengeance


November 9, 2015

Don’t Let the Latest Version of CryptoWall Destroy Everything You’ve Worked So Hard to Build…

CryptoWallRemember CryptoWall, the world’s most destructive ransomware? It’s back with a vengeance! CryptoWall 4.0 has surfaced with a multitude of encryption methods and evasion tactics that are tricking even the latest anti-virus programs. Ransomware is the worst possible threat for businesses as it encrypts all of your vital information, then demands a payment for the decryption key.

Tyler Moffitt, Sr. Threat Research Analyst at Webroot, explained, “CryptoWall 4.0 is the latest encrypting ransomware out right now and we’ve already observed it spreading. With the huge ‘success’ of CryptoWall 3.0, I anticipate this variant to be the number one threat to watch out for going into 2016.”

Are you prepared to fend off the destructive ransomware that costs you thousands, or worse, tens of thousands of dollars to recover?  

You’ve heard the saying ‘knowledge is power,’ and it’s absolutely true when it comes to fending off threats such as ransomware. Here are the top factors you need to know, in order to face the latest version of the most destructive ransomware:

  • Keep an eye out for it’s name:

The creators of CryptoWall 4.0 have given the ransomware a new name: help_your_files_ransomware. If you notice the phrase, make sure to call an experienced team of IT security professionals immediately. Also, make sure you’ve updated your file screening to include the phrase.

  • Don’t open suspicious email attachments:

If you’re not absolutely certain of the sender, do not open suspicious email attachments, even if it’s from someone you know, check the source. Don’t hesitate to call the sender and ask if they sent you something in the form of an attachment. Email attachments are still the most commonly used way to send ransomware.

  • Expect to feel even more frustrated than ever:

 In an effort to further frustrate victims into paying the fee, the attackers have started encrypting filenames, as well as files, so you’re not able to tell what files have been targeted and encrypted! This means filenames will appear with names including random letters and numbers.

  • Prepare in the same way you would for previous versions:

The good news is CryptoWall 4.0 behaves exactly like previous versions, although the encryption methods and evasion tactics are more advanced. CryptoWall 4.0 still infects in the same way, encrypts files in the same way, and uses the same domain to request/receive payments. This means you can prepare in the same way.

CryptoWall 4.0 is stronger and more sophisticated than previous versions, but ultimately, it’s the same preventative measures that matter:

  • Make sure files are backed up onsite and in the cloud, in order to ensure you’re able to recover those files instead of paying the fee.
  • Use an email filtering software to prevent malicious or annoying spam from getting to your inboxes.
  • Install an enterprise-grade firewall that keeps unauthorized users away from your network at all times.

Integris provides managed IT services wherein we keep our clients prepared for the latest threats – safeguarding with the appropriate security measures to prevent even the most destructive ransomware. Call (888) 330-8808 or email us at [email protected] for more information.

We're Integris. We're always working to empower people through technology.

Keep reading

Managed IT Services St. Paul: 5 Powerful Advantages for Businesses

Managed IT Services St. Paul: 5 Powerful Advantages for Businesses

As a business owner, it's important to make the most of your resources. This includes finding cost-effective solutions for managing and maintaining your company's technology. Keeping a competitive edge in your industry requires secure, modern tech that allows your...

IT Support Minneapolis: Where to Find Top IT Services in Minneapolis

IT Support Minneapolis: Where to Find Top IT Services in Minneapolis

If you’re wondering where to find top IT services in Minneapolis, it’s important to identify providers that offer a wide range of support, have great service and provide solid tech expertise. Comprehensive technology insight is especially important when it comes to IT...

Webinar: Email Security that Doesn’t Suck…

Webinar: Email Security that Doesn’t Suck…

Trustifi and Security 7 present Email Security That Doesn’t Suck.  In today’s age of over-complicated security tools, it is extremely difficult to manage the fine balance between security and productivity.   {% video_player "embed_player" overrideable=False,...