CryptoLocker is considered to be one of the most common iterations of RansomWare. It is often seen in email attachments as a zipped archive. These emails may seem to have originated from reputable or recognized sources. The attachment is also often disguised as a PDF without the file extension. This allows the Windows operating system to believe the file is legitimate. Consequently hiding the actual file extension, .exe, which is an executable file that then wreaks havoc on the device.
This malware can encrypt files across all local hard drives, removable drives as well as mapped network drives. The system then displays a message informing the user that the device has been compromised and demands for payment are made. The amount of these payments vary greatly and may include timelines in order to obtain the decryption key. If these demands are not met, the system becomes inaccessible.
It is strongly advised that you do not pay any ransom demand. But instead contact RansomRescue immediately. When paying these ransoms, people and businesses are inadvertently sustaining this unscrupulous business models (yes RansomWare has become a business model!) and allowing them to flourish and continue infecting and disrupting the business world.