How to protect against the CryptoLocker malware


Safety 101: Protection tips


How to protect against the CryptoLocker malware

Back to "Protection tips"
Latest update: 2019 May 31 ID: 10646

CryptoLocker is a malware which encrypts files on a computer and demands ransom for decrypting them. Files (documents, images, videos, etc.) are encrypted with a complex cryptographic code, which requires a key located on the malefactors' servers. As a rule, the ransom must be paid within the certain period of time, after which the decryption code claims to be deleted from the servers and restoring the files becomes impossible.

How the computer gets infected

  1. Through email messages You receive an email message with an attached .exe file, archive or image. The message usually imitates a notification or request from official institutions, delivery services, etc.
  2. By visiting an infected website Ransomware can get to your computer when you visit an infected website. Often, viruses are masked as offers to update commonly used software, such as Java, Flash Player, Adobe Reader, etc. which pops up on unsafe websites.

When you open an attachment in the message or when you click a suspicious link or download a file on a website, you risk infecting your computer with ransomware.

At the moment of infection no visible changes are made to the computer; the files are encrypted in the background mode. After the encryption process is completed, the screen gets blocked with the banner demanding payment in exchange to files decryption.

Shall I pay the ransom?

There is no guarantee that the files will be decrypted after you pay the ransom. Even if the malefactors send you the key, errors during decryption may lead to data loss.


What to do if your computer is infected


How to prevent the infection

Was this information helpful?
Yes No
Thank you


How can we improve this article?

We will not be able to contact you if you leave your email address or phone number. To contact technical support, please sign in to your Personal Account.

Submit Submit

Thank you for your feedback!

Your suggestions will help improve this article.