How to Protect Yourself From the CryptoLocker Virus

Published on November 7, 2013 by mike in computer

CryptoLocker is Trojan horse malware which surfaced in late 2013, a form of ransomware targeting computers running Microsoft Windows. CryptoLocker disguises itself as a legitimate attachment; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware’s control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid voucher) is made by a stated deadline, and says that the private key will be deleted and unavailable for recovery if the deadline passes. If the deadline is not met, the malware offers to decrypt data via an online service provided by the malware’s operators, for a significantly higher price in Bitcoin. Although CryptoLocker itself is readily removed, files remain encrypted in a way which researchers have considered infeasible to break, with some suggesting paying the ransom as the only effective way to recover files that had not been backed up.

How To Protect Yourself

First – backup your system! right away! Either locally using an external drive (then unplug from your system) or using an online service like

Second – make sure you are backed up – if you get infected it could cost you hundreds to get your data back or it might be gone forever

install malwarebytes anti-malware free by using this link –> –> download the file and run it, it will auto install the program. Then go the “protection” tab and activate the trial. We suggest buying the full version of this software

Install this program –> download –> run –> hit OK –> hit apply and then reboot –> This one is simple and easy

Contact us at if you need assistance or email

More information on the threat: