**What is it?
**Ransomeware is malware that stops you from using your PC until you pay a certain amount of money (the ransom). The two types that exist are Lock Screen, which locks the screen and prevents you from accessing anything on your PC, and Encryption, which encrypts the files on your PC to stop you from accessing them. The Encryption ransomware is the most malicious since the malware can encryption your data using an algorithm that cannot be broken, and the warns the user that if the ransom is not paid to the malware operators, the key will destroyed and the data lost forever.
How is it propagated?
Essential the malware enters through an infected file from a site or email.
It started when an end user in the client’s accounting department received an e-mail purporting to come from Intuit. Yes, the attached archived zip file with an executable inside should have been a dead giveaway that this message was malicious and was in no way affiliated with Intuit. But accounting employees are used to receiving e-mails from financial companies. When the receiver clicked on it, he saw a white box flash briefly on his screen but didn’t notice anything else out of the ordinary. He then locked his computer and attended several meetings.
Within a few hours, the company’s IT department received word of a corrupt file stored on a network drive that was available to multiple employees, including the one who received the malicious e-mail. A quick investigation soon uncovered other corrupted files, most or all of which had been accessed by the accounting employee. By the time CryptoLocker had run its course, hundreds of gigabytes worth of company data was no longer available.
**How do I protect my PC?
**First, make sure that your PC operating system and antivirus/malware protection are up to date and always observe best computing practices such as avoiding visiting unverified sites, clicking links from unknown sources, and avoiding executing/opening attachments from dubious email messages.
If you have any questions please reach out to me directly and if you would like further information on this threat, see the link below to Microsoft’s protection center.