Cryptlocker tor

The hackers behind CryptoLocker have created a customer support site

The CryptoLocker, appeared in early September of 2013 and is targeted at all versions of Windows. The victims of this mutant ransomware, they do not find their computer locked but their files are encrypted in such a way that no one can use them. Of course, the encryption key is in the hands of hackers who blackmail their victims, asking for the money to hand them the decryption key.
The idea is quite profitable for scammers, especially if it is , "hit" valuable files, which are not stored somewhere else. To ensure that no one can discover them, hackers require payments in Bitcoin, an untraceable virtual “. "
But their audacity does not stop here. Recently, they also created a technical forum s “customers.” Imagine: “Please how could we hack you?”

Cryptlocker tor

We won't mention it of the forum, as we do not wish to advertise malicious actions and serve scammers. We will only mention that it exists at  Deep Web and is accessible only via the anonymous Tor network. The site seems to be a decryption service that is designed to look like a customer support site.
The decryption value before the Bitcoins value was raised to 400 euro was 4 Bitcoins in the decryption key. Today the price has fallen to 2 Bitcoins, around 800 Euros.
All those who are affected by the CryptoLocker and have no backups, they will think very seriously about paying the ransom. Because even if they exist that can remove the virus, their files will remain encrypted.

If you do not want to be one of them, make immediate backups to your system, as infections with CryptoLocker seems to be on the rise. The Best Technology Site in Greecefgns

Get the best viral straight into your inbox!

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).