- Nov 5, 2011
- 5,855
CryptoLocker Gang Earns Millions in Just 100 Days: http://www.ibtimes.co.uk/cryptolocker-criminals-earn-30-million-100-days-1429607#end
Research by Dell Secureworks Counter Threat Team (CTU) has shown that the cyber-criminals behind the CryptoLocker ransomware have successfully infected up to 250,000 systems and are mainly targeting victims in the US and UK.
Based on the number of systems contacting a server set up specifically by Dell Secureworks soon after the emergence of CryptoLocker in September, researcher Keith Jarvis puts the number of infected systems globally at between 200,000 and 250,000.
The Cryptolocker ransomware works by encrypting a user's hard drive and the only way to un-encrypt and regain access to the files is to pay a ransom within 72 hours.
If the ransom isn't paid, the files are permanently locked with no way of ever accessing them again - though recently the criminals behind the malware have added a late payment option for a much higher price.
$300,000
Research by Dell Secureworks Counter Threat Team (CTU) has shown that the cyber-criminals behind the CryptoLocker ransomware have successfully infected up to 250,000 systems and are mainly targeting victims in the US and UK.
Based on the number of systems contacting a server set up specifically by Dell Secureworks soon after the emergence of CryptoLocker in September, researcher Keith Jarvis puts the number of infected systems globally at between 200,000 and 250,000.
The Cryptolocker ransomware works by encrypting a user's hard drive and the only way to un-encrypt and regain access to the files is to pay a ransom within 72 hours.
If the ransom isn't paid, the files are permanently locked with no way of ever accessing them again - though recently the criminals behind the malware have added a late payment option for a much higher price.
$300,000
Last edited: