Cryptolocker trying to establish a web connection to one of the servers where it is controlled, and it generates a public and a private key to encrypt the files and then ask for money from victims
Cryptography public-private key pair uses two different keys: one public that encrypted files and other private, decrypts them. The public key allows anyone to encrypt files on behalf of computer users, but only they can decrypt the private key.
Cryptolocker encrypts documents in common formats including those in Microsoft Office or Access database.
Most attempted attacks have been recorded so far in the U.S., Germany and UK.
Cryptography public-private key pair uses two different keys: one public that encrypted files and other private, decrypts them. The public key allows anyone to encrypt files on behalf of computer users, but only they can decrypt the private key.
Cryptolocker encrypts documents in common formats including those in Microsoft Office or Access database.
Most attempted attacks have been recorded so far in the U.S., Germany and UK.
No comments:
Post a Comment