Measures to Avoid Being Held for Ransom by CryptoLocker

Pullman & Comley, LLC
Contact

As mentioned in last month’s Cyber Law Tracker (http://www.pullcom.com/news-publications-463.html#ttop), US-CERT (the United States Computer Emergency Readiness Team) identified a malware campaign titled CryptoLocker, which is a new version of ransomware that has been spreading through phony e-mails designed to resemble legitimate businesses (https://www.us-cert.gov/ncas/alerts/TA13-309A). In addition to updating its alert to include information about the effects of CryptoLocker, US-CERT also included some recommendations about measures that users and administrators could take to protect their computer networks from this malware. We thought it might be helpful to list here some of the more common prevention and mitigation tips that you might want to consider:

Prevention

  • Treat all unsolicited e-mails (especially those from unknown senders) with caution and never click on links in these e-mails.
  • Carefully read the terms and conditions before agreeing to install third party programs or applications.
  • Install a firewall to help protect against unauthorized users accessing your system.
  • Perform regular backups of all systems to limit the impact of data and/or system loss.
  • Maintain up-to-date anti-virus software and keep your operating system and software up-to-date with the latest patches.
  • Participate in routine vulnerability scanning to identify where your system is vulnerable to malicious activity, and remedy those weaknesses.

Mitigation

  • Immediately disconnect the infected system from wireless or wired networks to prevent the malware from infecting any more files on the network.
  • Block all outbound traffic to external networks.
  • If possible, determine if any of the infected systems successfully connected to any site on the Internet and what information, if any, was exposed.
  • If identifying personal information has been compromised, notify the relevant individuals.
  • Consult with a reputable security expert to assist in removing the malware.
  • Change all online account passwords and network passwords after removing the system from the network.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Pullman & Comley, LLC | Attorney Advertising

Written by:

Pullman & Comley, LLC
Contact
more
less

PUBLISH YOUR CONTENT ON JD SUPRA NOW

  • Increased visibility
  • Actionable analytics
  • Ongoing guidance

Pullman & Comley, LLC on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide